ITA202 - MC

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of? A) Trojan horse B) virus C) worm D) spyware

A) Trojan horse

A critical necessity for ensuring the integration of local systems into a global system is A) adherence to data and technical standards. B) use of standard hardware at the local level. C) use of standard user software at the local level. D) all of the above.

A

A force in the environment to which businesses must respond and that influences the direction of the business is called a business A) driver. B) threat. C) process. D) matrix.

A

A pivot table is a A) spreadsheet tool that displays two or more dimensions of data in a convenient format. B) type of relational database. C) chart tool that can rotate columnar data quickly and visually. D) tool for performing sensitivity analysis.

A

An entire information system is broken down into its subsystems by using A) high-level data flow diagrams. B) low-level data flow diagrams. C) process specifications. D) structured diagrams.

A

As a firm moves from local option systems to regional and global systems A) agency costs increase. B) coordination costs decrease. C) transaction costs increase. D) both transaction and agency costs increase.

A

Business processes are analyzed, simplified, and redesigned in A) business process redesign. B) rationalization of procedures. C) automation. D) paradigm shifts.

A

Enabling organizations to make continual improvements to many business processes and to use processes as the fundamental building blocks of corporate information systems is the goal of A) business process management. B) business process redesign. C) workflow engineering. D) workflow management.

A

Fourth-generation tools cannot replace conventional development tools because they A) cannot handle large numbers of transactions or extensive procedural logic. B) are not designed to integrate with legacy systems. C) do not incorporate methods for documentation. D) do not incorporate methods for testing.

A

Franchise companies have typically had ________ systems. A) duplicated B) centralized C) networked D) decentralized

A

General cultural factors driving global business are A) global communication and transportation technologies, a global knowledge base, and global social norms. B) the development of global markets, political stability, and a global workforce. C) the rise of the global workforce, political stability, and a global knowledge base. D) the rise of a global workforce, global economies of scale, and global production and operations.

A

German companies A) do not recognize the profit until the project is completely finished and they have been paid. B) recognize profits before the project is finished. C) recognize profits when the project is initialized. D) do not recognize the profits until they have been formally audited.

A

In duplicated systems A) development occurs at the home base and operations are handed over to autonomous units in foreign locations. B) each foreign unit designs its own unique solutions and systems. C) systems development and operations occur in an integrated and coordinated fashion across all units. D) foreign units design the solutions and systems used at the domestic home base.

A

In order, what are the first three steps in BPM? A) (1) identifying processes for change, (2) analyzing existing processes, (3) designing the new process B) (1) analyzing existing processes, (2) identifying processes for change, (3) designing the new process C) (1) identifying processes for change, (2) designing the new process, (3) implementing the new process D) (1) analyzing processes to change (2) designing the new process, (3) measuring the optimized process

A

In terms of global business strategy and structure, a domestic exporter will use a policy of A) some dispersed sales, with centralized production, accounting, human resources, and strategic management. B) centralized production and accounting with decentralized marketing and human resources. C) centralized production, accounting, marketing, and human resources. D) dispersed production and marketing, with centralized accounting, human resources and strategic management.

A

In which type of systems building are the development stages organized so that tasks in one stage are completed before the tasks in the next stage begun? A) traditional B) prototyping C) RAD D) all of the above

A

Mintzberg's classification of managerial roles outlines which three main categories? A) interpersonal, informational, and decisional B) symbolic, decisional, and interpersonal C) symbolic, interpersonal, and technical D) technical, interpersonal, and informational

A

Most companies pursuing a global strategy begin as A) domestic exporters. B) multinationals. C) franchisers. D) transnationals.

A

Sixty-eight percent of the world's mobile phone subscriptions are in A) developing countries. B) Europe. C) the United States. D) the United States and Canada.

A

System design specifications that address the category of database design issues will include specifications for A) transaction volume and speed requirements. B) data entry. C) job design. D) program logic and computations.

A

The chapter outlines three steps in developing an effective global system solution. Which of the following is not one of these steps? A) Identify outdated legacy systems to be replaced. B) Identify the core systems to coordinate centrally. C) Choose a developmental approach: incremental, evolutionary, or other. D) Define the core business processes.

A

The five classical functions of managers are planning, organizing, deciding, controlling, and A) coordinating. B) leading. C) managing. D) negotiating.

A

The process of creating workable information systems in a very short period of time is called A) RAD. B) JAD. C) prototyping. D) B and C.

A

The role of entrepreneur falls into which of Mintzberg's managerial classifications? A) decisional B) informational C) interpersonal D) symbolic

A

The type of decision that can made by following a definite procedure is called a(n) ________ decision. A) structured B) unstructured C) semistructured D) procedural

A

To show each level of a system's design, its relationship to other levels, and its place in the overall design structure, structured methodologies use A) structure charts. B) Gantt and PERT charts. C) process specifications. D) data flow diagrams.

A

To understand and define the contents of data flows and data store, system builders use A) a data dictionary. B) process specifications diagrams. C) user documentation. D) data flow diagrams.

A

What is the primary driving factor in firms to select domestic outsourcing firms to build system solutions? A) to take advantage of technical skills the firm does not have B) to save labor costs C) to avoid change management issues D) all of the above

A

When developing a global system, bringing the opposition of local groups into the process of designing and implementing the solution without giving up control over the direction and nature of the change is called A) cooptation. B) change management. C) implementation. D) advocacy.

A

Which of the following are most likely to rely primarily on production reports for their decision-making needs? A) operational employees and supervisors B) senior managers C) analytic modelers D) business analysts

A

Which of the following companies is not one of the top five producers of business intelligence and analytics products? A) Sun B) Microsoft C) SAP D) IBM

A

Which of the following describes how the Simon framework of decision-making works in high-velocity decision environments? A) All four steps of the process are handled by software algorithms; humans are eliminated from the decisions because they are too slow. B) The first three steps of the process are handled by software algorithms and the final step is handled by experienced managers. C) The first two steps of Simon's framework are eliminated and the final two steps are handled by software algorithms. D) All fours steps are performed by humans with the support of high-speed, high-volume DSS and ESS.

A

Which of the following statements best describes the term business intelligence? A) the infrastructure for collecting and managing business data B) the tools and techniques used to analyze and understand business data C) software developed exclusively for business management D) information systems involved in business decision making

A

Which systems are worth sharing on a transnational basis, from a cost and feasibility point of view? A) only systems that support functions that are absolutely critical to the organization B) core systems and worthwhile provincial systems C) core systems and any financial systems that can be easily integrated with each other D) financial and accounting systems

A

Which type of decision is calculating gross pay for hourly workers? A) structured B) unstructured C) semistructured D) none of the above

A

Which type of information system uses data visualization technology to analyze and display data for planning and decision making in the form of digitized maps? A) GIS B) DSS C) MIS D) TPS

A

Which types of decisions are automated for high-velocity decision-making? A) highly-structured decisions B) semi-structured financial decisions C) unstructured financial decisions D) all of the above

A

________ are visual tools for presenting performance data in a BI system. A) Dashboards and scorecards B) Paramaterized reports C) Reports and the drill-down feature D) Scenarios and models

A

________ development focuses on rapid delivery of working software by breaking a large project into a series of small sub-projects that are completed in short periods of time using iteration and continuous feedback. A) Agile B) Rapid application C) Joint application D) Object-oriented

A

_____ refers to policies, procedures, and technical measures used to prevent unauthorized accesses, alternation, theft, or physical damage to information systems. A) "Security" B) "Controls" C) "Benchmarking" D) "Algorithms"

A) "Security"

An example of a keystone firm within a business ecosystem is A) Apple and software application writers in the mobile platform ecosystem. B) GUESS and the fashion ecosystem. C) Citibank and the ATM ecosystem. D) American Airlines and the computerized reservation ecosystem.

A) Apple and software application writers in the mobile platform ecosystem.

An alternative to using application server software for interfacing between a Web server and back-end databases is A) CGI B) HTML C) Java D) SQL

A) CGI

________ systems are designed to help firms manage their relationships with their customers. A) CRM B) MIS C) CLE D) CLU

A) CRM

Oracle Database Lite is a(n) A) DBMS for small handheld computing devices B) Internet DBMS C) mainframe relational DBMS D) DBMS for midrange computers.

A) DBMS for small handheld computing devices.

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a _____ attack. A) DDos B) DoS C) SQL injection D) phishing

A) DDoS

Which type of system would you use to determine what trends in your supplier's industry will affect your firm the most in five years? A) ESS B) TPS C) MIS D) DSS

A) ESS

All of the following statements regarding Lotus Notes are true except for A) It began as an e-mail and messaging client. B) It is the most widely used collaboration tool at Fortune 1000 companies. C) Firmwide installations at a large company require specialized servers and may cost millions of dollars per year. D) It provides tools for e-mail, calendars, help desk, CRM, blogs, and wikis.

A) It began as an e-mail and messaging client.

Which of the following statements is NOT true about information technology's impacts on business firms? A) It helps firms expand in size. B) It helps firms lower the cost of market participation. C) It helps reduce internal management costs. D) It helps reduce transaction costs.

A) It helps firms expand in size.

________ is the ability to offer individually tailored products or services using the same production resources as bulk production. A) Mass customization B) Size customization C) Magnitude customization D) Dimension customization

A) Mass customization

________ management is an important capability for service processes that is found in most major CRM software products. A) Returns B) Lead C) Account D) Events

A) Returns

Enabling management to make better decisions regarding organizing and scheduling sourcing, production, and distribution is a central feature of A) SCMs B) TPSs C) KMSs D) ERPs

A) SCMs

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain? A) Safety stock B) Continuous replenishment C) Just-in-time strategies D) Demand planning

A) Safety stock

You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take? A) Select the functions of the system you wish to use. B) Select the business processes you wish to automate C) Map the company's business processes to the software's business processes D) Map the software's business processes to the company's business processes

A) Select the functions of the system you wish to use.

The /join/ operation A) combines relational tables to provide the user with more information than is otherwise available. B) identifies the table from which the columns will be selected. C) creates a subset consisting of columns in a table. D) organizes elements in to segments

A) combines relational tables to provide the user with more information than is otherwise available.

When tailoring a particular aspects of a system to the way a company does business enterprise software can provide the company with A) configuration tables B) web services C) data dictionaries D) middleware

A) configuration tables

The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its A) culture. B) environment. C) atmosphere. D) values.

A) culture

Which of the following non-digital data storage items is most similar to a database? A) library card catalog B) cash register receipt C) doctor's office invoice D) list of sales totals on a spreadsheet

A) library card catalog

Executive support systems are information systems that support the A) long-range planning activities of senior management. B) knowledge and data workers in an organization. C) decision-making and administrative activities of middle managers. D) day-to-day processes of production.

A) long-range planning activities of senior management.

Amazon's use of the Internet as a platform to sell books more efficiently than traditional bookstores illustrates a use of information services for A) low-cost leadership. B) marketing effectiveness. C) focusing on market niche. D) strengthening supplier intimacy.

A) low-cost leadership.

A large bureaucracy existing in a slowly changing environment that produces standard products and is dominated by centralized management making is classified by Mintzberg as a ________ bureaucracy. A) machine B) professional C) divisionalized D) multidivisional

A) machine

In the direct cutover conversion strategy, the new system A) is tested by an outsourced company. B) replaces the old one at an appointed time. C) and the old are run together. D) is introduced in stages.

B

In what stage of systems development are design specifications created? A) systems analysis B) systems design C) testing D) conversion

B

Logically related tasks to produce specific business results best defines A) information systems. B) business processes. C) SOPs. D) core competencies.

B

MIS typically produce A) new ways of looking at data that emphasize change, flexibility, and rapid response. B) fixed, regularly scheduled reports based on data extracted from the organization's TPS. C) solutions to semistructured problems appropriate for middle management decision making. D) assumptions, responses to ad hoc queries, and graphic representations of existing data.

B

Measures defined by management and used to internally evaluate the success of a firm's financial, business process, customer, and learning and growth are called A) benchmarks. B) KPIs. C) the balanced scorecard method. D) BPM.

B

Most large companies with overseas operations have inherited A) recently built technology platforms for international systems. B) batch-oriented reporting from independent foreign divisions to corporate headquarters. C) transaction-oriented reporting based at the home office for overseas business. D) global marketing systems developed domestically.

B

System testing A) includes all the preparations for the series of tests to be performed on the system. B) tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned. C) tests each program separately. D) provides the final certification that the system is ready to be used in a production setting.

B

Systems design A) describes what a system should do to meet information requirements. B) shows how the new system will fulfill the information requirements. C) identifies which users need what information, where, when and how. D) is concerned with the logical view of the system solution.

B

The concern that the structure of data is consistent within an information source reflects which quality dimension of information? A) accuracy B) integrity C) validity D) consistency

B

The decision to approve a capital budget is an example of a(n) ________ decision. A) semistructured B) unstructured C) structured D) undocumented

B

The information system used by Caesar's Entertainment, which combines data from internal TPS with information from financial systems and external sources to deliver reports such as profit-loss statements, impact analyses, is an example of A) DSS. B) ESS. C) CDSS. D) MIS.

B

The leading methodology for understanding the really important information needed by a firm's executives is called the ________ method. A) digital dashboard B) balanced scorecard C) KPI D) data visualization

B

The network systems structure is the most visible in ________ services. A) production B) financial C) marketing D) software design

B

When there is no well-understood or agreed-on procedure for making a decision, it is said to be A) undocumented. B) unstructured. C) documented. D) semistructured.

B

Which of the following are most likely to rely primarily on the drill-down functionality of BI for their decision-making needs? A) IT developers B) managers C) operational employees D) business analysts

B

Which of the following best describes the term business analytics? A) the infrastructure for collecting and managing business data B) the tools and techniques used to analyze and understand business data C) software developed exclusively for business management D) information systems involved in business decision making

B

Which of the following is not a specific challenge to global business system? A) shortages of skilled consultants B) language differences C) different telecommunication standards D) different data transfer speeds

B

Which of the following is not one of the five main analytic functionalities of BI systems for helping decision makers understand information and take action? A) production reports B) business case archives C) parameterized reports D) forecasts, scenarios, and models

B

Which of the following is not one of the six main elements in the business intelligence environment discussed in this chapter? A) managerial users and methods B) organizational environment C) user interface D) data from the business environment

B

Which of the following restricts the flow of personal information to countries that do not meet strict European information laws on personal information? A) Free Trade Agreement B) European Union Data Protection Directive C) United Nations Privacy Act D) European Transborder Data Flow Act

B

Data mining is a tool for allowing users to A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports.

B) find hidden relationships in data

DBMSs typically include report-generating tools in order to A) retrieve and display data B) display data in an easier-to-read format C) display data in graphs D) perform predictive analysis

B) display data in an easier-to-read format

The use of digital technology and the Internet to execute the major business processes in the enterprise is called A) e-commerce. B) e-business. C) enterprise applications. D) MIS.

B) e-business.

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm? A) wireless network B) employees C) authentication procedures D) lack of data encryption

B) employees

What is the most important function of an enterprise application? A) increasing speed of communicating B) enabling business functions and departments to share information C) enabling a company to work collaboratively with customers and suppliers D) enabling cost-effective e-business processes

B) enabling business functions and departments to share information

Enterprise systems are also known as ________ systems. A) resource planning B) enterprise resource planning C) enterprise support D) management information

B) enterprise resource planning

Which systems often deliver information to senior executives through a portal, which uses a Web interface to present integrated personalized business content? A) transaction processing systems B) executive support systems C) management information systems D) decision-support systems

B) executive support systems

Which of the following types of system helps expedite the flow of information between the firm and its suppliers and customers? A) intranet B) extranet C) KMS D) TPS

B) extranet

Maintaining the organization's financial records is a central purpose of which main business function? A) manufacturing and accounting B) finance and accounting C) sales and manufacturing D) finance and sales

B) finance and accounting

An example of a business using information systems to attain operational excellence is A) Wal-Mart's RetailLink system. B) the Mandarin Oriental hotel's customer-preference tracking system. C) Verizon's Web-based digital dashboard. D) Apple Inc.'s iPod.

A) Wal-Mart's RetailLink system

A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because A) a data mart typically focuses on a single subject area or line of business B) all the information is historical C) a data mart uses a Web interface D) all of the information belongs to a single company

A) a data mart typically focuses on a single subject area or line of business

An example of a collaboration tool that supports colocated, asynchronous collaboration is A) a team room. B) e-mail. C) a MUD. D) a wall display.

A) a team room.

Customer service modules in CRM systems provide tools for: A) assigning and managing customer service requests. B) capturing prospect and customer data. C) identifying profitable and unprofitable customers. D) managing sales prospect and contact information.

A) assigning and managing customer service requests.

Which of the following activities would you perform to measure and compare your business processes to similar processes of other companies within your industry? A) benchmarking B) best practices C) value chain analysis D) strategic systems analysis

A) benchmarking

How are information systems used at the industry level to achieve strategic advantage? A) by building industry-wide, IT-supported consortia and symposia B) by raising the bargaining power of suppliers C) by encouraging the entry of new competitors D) by enforcing standards that reduce the differences between competitors

A) by building industry-wide, IT-supported consortia and symposia

Application controls A) can be classified as input controls, processing controls, and output controls B) govern the design, security, and use of computer programs and the security data files in general throughout the organization C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. D) include software controls, computer operations controls, and implementation controls

A) can be classified as input controls, processing controls, and output controls

Unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network? A) client computer B) communications lines C) corporate server D) internal corporate back-end system

A) client computer

The Internet raises the bargaining power of customers by A) creating new opportunities for building loyal customer bases. B) making more products available. C) making information available to everyone. D) lowering transaction costs.

C) making information available to everyone.

The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called A) information systems literacy. B) information systems architecture. C) management information systems. D) information technology infrastructure.

C) management information systems

Producing bills of materials is a business process within the ________ function. A) finance and accounting B) human resources C) manufacturing and production D) sales and marketing

C) manufacturing and production

The average number of tickets sold daily online is an example of A) input. B) raw data. C) meaningful information. D) feedback.

C) meaningful information

Which of the following business objectives best describes the strategy behind the use of technology in the new Yankee Stadium? A) competitive advantage B) improved decision making C) new products and services D) survival

C) new products and services

In terms of data relationships, /associations/ refers to A) events linked over time B) patterns that describe a group to which an item belongs C) occurrences linked to a single event D) undiscovered groupings

C) occurrences linked to a single event

The discipline that focuses on mathematical techniques for optimizing parameters of organizations, such as transportation and inventory control, is A) management science. B) MIS. C) operations research. D) utilization management.

C) operations research.

Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product best describes supply chain ________ systems. A) demand B) delivery C) planning D) execution

C) planning

Supply chain complexity and scale increase when firms A) move to globalization B) manage the procurement, manufacturing, and distribution functions themselves C) produce products and services that coordinate with hundreds or more firms and suppliers D) Modify their existing workflows to comply with supply-chain management systems

C) produce products and services that coordinate with hundreds or more firms and suppliers

Mintzberg's classification of organizational structure categorizes the knowledge-based organization where goods and services depend on the expertise and knowledge of professionals as a(n) A) entrepreneurial structure. B) divisionalized bureaucracy. C) professional bureaucracy. D) adhocracy.

C) professional bureaucracy.

The type of logical database model that treats data as if they were stored in two-dimensional tables is the A) OODBMS B) pre-digital DBMS C) relational DBMS D) hierarchical DBMS

C) relational DBMS

Which of the following industries has a low barrier to entry? A) automotive B) computer chip C) restaurant D) airline

C) restaurant

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n) A) security policy B) AUP C) risk assessment D) business impact analysis

C) risk assessment

Business processes are collections of A) informal practices and behaviors. B) formalized and documented practices. C) routines. D) rights and privileges.

C) routines

Operational CRM applications include tools for: A) identifying buying patterns. B) calculating CLTV. C) salesforce automation. D) pinpointing unprofitable customers.

C) salesforce automation

Network economics A) applies the law of diminishing returns to communities of users. B) applies traditional economics to networked users. C) sees the cost of adding new members as inconsequential. D) balances the high cost of adding new members to a community against the lower cost of using network infrastructure.

C) sees the cost of adding new members as inconsequential.

In a relational database, the three basic operations used to develop useful sets of data are A) select, project, and where B) select, join, and where C) select, project, and join D) select, from, and join

C) select, project, and join

A corporation that funds a political action committee, which in turn promotes and funds a political candidate who agrees with the values of that corporation, could be seen as investing in which main category of complementary assets? A) managerial B) governmental C) social D) organizational

C) social

Data management technology consists of the A) physical hardware and media used by an organization for storing data. B) detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. C) software governing the organization of data on physical storage media. D) hardware and software used to transfer data.

C) software governing the organization of data on physical storage media

Which of the following is not an example of next-generation enterprise applications? A) open-source solutions B) on-demand solutions C) solutions incorporating SCM D) solutions incorporating SOA

C) solutions incorporating SCM

To what competitive force did the printed encyclopedia industry succumb? A) positioning and rivalry among competitors B) low cost of entry C) substitute products or services D) customer's bargaining power

C) substitute products or services

Which of the following is not a method for performing a data quality audit? A) surveying entire data files B) surveying samples from data files C) surveying definition and query files D) surveying end users about their perceptions of data quality

C) surveying data definition and query files

A firm that must invest in new information systems capabilities in order to comply with federal legislation can be said to be investing to achieve which business objective? A) customer intimacy B) operational excellence C) survival D) improved reporting

C) survival

The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of information systems to achieve which business objective? A) improved efficiency B) customer and supplier intimacy C) survival D) competitive advantage

C) survival

If two organizations pool markets and expertise that result in lower costs and generate profits it is often referred to as creating A) a value web. B) a value chain. C) synergies. D) core competencies.

C) synergies

The principal liaison between the information systems groups and the rest of the organization is a(n) A) programmer. B) information systems manager. C) systems analyst. D) CTO.

C) systems analyst.

The costs for firms operating on a global scale have been drastically reduced by A) networking technology. B) investments in organizational complementary assets. C) the Internet. D) the rise of digital content.

C) the Internet.

A managerial element in the UPS tracking system described in the chapter is A) taking inventory. B) providing package status reports to customers. C) the decision to use automation. D) in-house package tracking software.

C) the decision to use automation

To monitor the status of internal operations and the firm's relations with the external environment, managers need ________ systems. A) decision-support B) knowledge C) transaction processing D) management information

C) transaction processing

A company's suppliers and the processes for managing relationships with them is the A) supplier's internal supply chain. B) external supply chain. C) upstream portion of the supply chain. D) downstream portion of the supply chain.

C) upstream portion of the supply chain.

A collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively is called a(n) A) industry value chain. B) business ecosystem. C) value web. D) consortia.

C) value web

22) The major dimensions of international systems architecture include each of the following except A) the global environment. B) corporate global strategy. C) technology platform. D) transborder data flows.

D

(T/F) A data flow diagram offers a logical and graphical model of information flow, partitioning a system into modules that show manageable levels of detail.

T

(T/F) A geographic information system is a decision support system designed specifically to work with spatial information.

T

(T/F) A powerful strategic advantage for a globalized firm is lowered cost factors in production.

T

(T/F) A problem with prototyping is that the systems constructed using this method may not be able to handle large quantities of data in a production environment.

T

(T/F) A structured decision can be made by following a well-defined set of procedures. No "feel" or intuition is necessary.

T

(T/F) Accounting practices can vary significantly from country to country.

T

(T/F) At the cultural level, differences among cultures produce differences in social expectations, politics, and legal rules.

T

(T/F) Backward sensitivity analysis software is used for goal seeking.

T

(T/F) CASE tools facilitate the creation of clear documentation and the coordination of team development efforts.

T

(T/F) End-user-developed systems can be completed more rapidly than those developed through the conventional systems lifecycle.

T

(T/F) European countries have very strict laws concerning transborder data flows and privacy.

T

(T/F) Failure to address properly the organizational changes surrounding the introduction of a new system can cause the demise of an otherwise good system.

T

(T/F) GDSS facilitate the solution of unstructured problems by a set of decision makers working together as a group in either the same location or different locations.

T

(T/F) Global business drivers can be divided into two groups: general cultural factors and specific business factors.

T

(T/F) In a multinational strategy, financial management is centralized while production and sales are decentralized.

T

(T/F) In international companies, English has become a kind of standard business language.

T

(T/F) In some forms of outsourcing, a company hires an external vendor to create the software for its system, but operates the software on its own computers.

T

(T/F) MIS typically produce fixed, regularly scheduled reports based on data extracted and summarized from the firm's underlying transaction processing systems.

T

(T/F) Object-oriented development is more incremental than traditional structured development.

T

(T/F) One major telecommunications challenge in an international setting is making data flow seamlessly across networks shaped by disparate national standards.

T

(T/F) Operational managers tend to make more structured decisions.

T

(T/F) Prototyping is more iterative than the conventional lifecycle.

T

(T/F) Structured decision making is most prevalent at lower organizational levels.

T

(T/F) The European Union Data Protection Directive restricts the flow of any information to countries that do not meet strict European laws on personal information.

T

(T/F) The classical model of management does not address what exactly managers do when they plan, decide things, and control the work of others.

T

(T/F) The collapse of the Eastern block has speeded the growth of a world culture.

T

(T/F) The growth of powerful communications technologies and the emergence of world cultures create the condition for global markets.

T

(T/F) The intelligence phase of decision making consists of discovering, identifying, and understanding the problems occurring in the organization.

T

(T/F) The most common form of IT-enabled organizational change is automation.

T

(T/F) The system is not in production until conversion is complete.

T

(T/F) To avoid the cost and uncertainty of moving information across national boundaries, most multinational firms have developed information systems within each European country.

T

(T/F) Unstructured decisions are novel and nonroutine, and there is no well-understood or agreed-on procedure for making them.

T

(T/F) What-if analysis works forward from known or assumed conditions.

T

The term "management information systems" designates a specific category of information systems serving A) integrated data processing throughout the firm. B) transaction process reporting. C) employees with online access to historical records. D) middle management functions.

D) middle management functions.

A DBMS reduces data redundancy and inconsistency by A) enforcing referential integrity B) uncoupling program and data C) utilizing a data dictionary D) minimizing isolated files with repeated data

D) minimizing isolated files with repeated data

The point-of-sale Pulse system used by Domino's to maintain consistent and efficient management functions in its restaurants is best categorized as which type of system? A) TPS B) DSS C) CRM D) more than one of the above

D) more than one of the above

The hardware and software used to transfer data in an organization is called A) data management technology. B) networking and data management technology. C) data and telecommunications technology. D) networking and telecommunications technology.

D) networking and telecommunications technology

A manufacturer of deep-sea oil rigs may be least concerned about this marketplace force. A) product differentiation B) traditional competitors C) low number of suppliers D) new market entrants

D) new market entrants

The type of database management approach that can handle multimedia is the A) hierarchical DBMS B) relational DBMS C) network DBMS D) object-oriented DBMS

D) object-oriented DBMS

Most antivirus software is effective against A) only those viruses active on the Internet and through e-mail B) any virus C) any virus except those in wireless communications applications D) only those viruses already known when the software is written

D) only those viruses already known when the software is written

In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is A) middle management. B) service workers. C) production management. D) operational management.

D) operational management.

The HIPAA Act of 1997 A) requires financial institutions to ensure the security of customer data B) specifies best practices in information systems security and control C) imposes responsibility on companies and management to safeguard the accuracy of financial information D) outlines medical security and privacy rules

D) outlines medical security and privacy rules

Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems. A) push; pull B) demand; continual C) upstream; downstream D) planning; execution

D) planning; execution

The logical view A) shows how data are organized and structured on the storage media. B) presents an entry screen to the user. C) allows the creation of supplementary reports. D) presents data as they would be perceived by end users.

D) presents data as they would be perceived by end users.

As discussed in the chapter opening case, which of the four generic strategies did Verizon employ to combat the competition offered by AT&T? A) low-cost leadership B) focus on market niche C) customer and supplier intimacy D) product differentiation

D) product differentiation

Which of the following is not one of the four main classifications for collaboration tools identified by the space/time matrix? A) synchronous/colocated B) same time/remote C) different time/remote D) remote/colocated

D) remote/colocated

Identifying customers is a responsibility of the ________ function. A) finance and accounting B) human resources C) manufacturing and production D) sales and marketing

D) sales and marketing

Which of the following is not one of the main firewall screening techniques? A) application proxy filtering B) static packet filtering C) NAT D) secure socket filtering

D) secure socket filtering

ESS are specifically designed to serve which level of the organization? A) operational B) end-user C) middle management D) senior management

D) senior management

A key logger is a type of A) worm B) Trojan horse C) virus D) spyware

D) spyware

According to Leavitt's model of organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are A) environment, organization, structure, tasks. B) technology, people, culture, and structure. C) organization, culture, management, and environment D) tasks, technology, people, and structure.

D) tasks, technology, people, and structure.

Which of the following is one of the support activities in a firm's value chain? A) inbound logistics B) operations C) sales and marketing D) technology

D) technology

Output A) is feedback that has been processed to create meaningful information. B) is information that is returned to appropriate members of the organization to help them evaluate the input stage. C) transfers data to the people who will use it or to the activities for which it will be used. D) transfers processed information to the people who will use it or to the activities for which it will be used.

D) transfers processed information to the people who will use it or to the activities for which it will be used

Uncertainties arise in any supply chain because of A) inaccurate or untimely information B) poor integration between systems of suppliers, manufactures , and distributors C) Inefficient or inaccurate MIS D) unforeseeable events

D) unforeseeable events

Which of the following is not one of the techniques used in Web mining? A) content mining B) structure mining C) usage mining D) user mining

D) user mining

(T/F) Thorough testing is not required if, during the programming stage, the design documents are sufficiently detailed.

F

(T/F) Web-based tools for videoconferencing and electronic meetings are the primary tools for GDSS.

F

(T/F) With the growth of the Internet and reliable phone networks, skilled consultants are readily available to companies operating in global markets.

F

Which of the following is NOT an IT infrastructure service component? a) Operating system software b) Computing platforms to provide a coherent digital environment c) physical facility management to manage the facilities housing physical components d) IT management services to plan and develop the infrastructure and provide project management

a) Operating system software

Which of the following Internet connection types offers the greatest bandwidth? a) T3 b) DSL c) cable d) T1

a) T3

Which protocol is the Internet based on? a) TCP/IP b) FTP c) packet-switching d) HTTP

a) TCP/IP

The 802.11 set of standards for wireless LANs is known as a) Wi-Fi b) WiMax c) Bluetooth d) RFID

a) Wi-Fi

what is the foundation technology for web services? a) XML b) HTML c) SOAP d) UDDI

a) XML

running a java program on a computer requires a) a Java virtual machine to be installed on the computer b) a Java virtual machine to be installed on the server hosting the Java applet c) a miniature program to be downloaded to the user's computer d) no specialized software, as Java is platform-independent

a) a Java virtual machine to be installed on the computer

To use the analog telephone system for sending digital data, you must also use a) a modem b) a router c) DSL d) twisted wire

a) a modem

Hardware and software that attempts to emulate the processing patterns of the biological brain best describes ____ a) a neural network b) an expert system c) case-based reasoning d) fuzzy logic

a) a neural network

Specialized systems built for engineers, scientists, and other knowledge workers charged with discovering and creating new knowledge for a company are called ______ a) KWS b) LMS c) wikis d) CAD systems

a) KWS

Software that manages the resources of the computer is called a) Operating system software b) application software. c) Data management software. d) network software

a) Operating system software

_______ unleash powerful economies of scale and result in declines in manufactured computer products a) internet and web technologies b) technology standards c) linux and open-source software d) client/server technologies

b) technology standards

Which of the following is /not/ one of the four defining features of Web 2.0? a) interactivity b) real-time user control c) cloud computing d) social participation

c) cloud computing

Digital goods are goods that are a) produced digitally b) sold over digital networks c) delivered digitally d) used with digital equipment

c) delivered digitally

Changing organizational behavior by sensing and responding to new experience and knowledge is called ______ a) change management b) knowledge networking c) the knowledge value chain d) organizational learning

d) organizational learning

Selling the same goods to different targeted groups at different prices is called a) cost customization b) cost optimization c) price gouging d) price discrimination

d) price discrimination

An extranet that links a large firm to its suppliers and other key business partners is called a(n) a) e-hub b) marketspace c) exchange d) private industrial network

d) private industrial network

Virtual reality systems a) provide engineers, designers, and factory managers with precise control over industrial design and manufacturing b) provide an important source of expertise for organizations c) allow groups to work together on documents d) provide architects, engineers, and medical workers with precise, photorealistic simulations of objects

d) provide architects, engineers, and medical workers with precise, photorealistic simulations of objects

Which of the following is /not/ one of the categories of services that are popular for m-commerce? a) location-based services b) financial services c) games and entertainment d) retail shopping

d) retail shopping

Which of the following was the leading marketing format in 2010? a) display ads b) e-mail c) classifieds d) search engine

d) search engine

You are planning the requirements for a site tracking and reporting system for your company Web site. Which of the following information requirements would /not/ be essential for this function? a) number of unique visitors b) pages visited c) products purchased d) secure credit card clearing

d) secure credit card clearing

Expertise and experience of organizational members that has not been formally documented best describes ______. a) wisdom b) information c) data d) tacit knowledge

d) tacit knowledge

The quality of ubiquity, as it relates to e-commerce, is illustrated by a) the same set of standards being used across the globe b) the spread of plentiful, cheap information c) the enabling of commerce worldwide d) the availability of the Internet everywhere and anytime

d) the availability of the Internet everywhere and anytime

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) a) service-oriented architecture b) on-demand architecture c) multi-tiered client/server architecture d) two-tiered client/server architecture

d) two-tiered client/server architecture

all of the following are contemporary and growing hardware platform trends except a) green computing b) virtualization c) cloud computing d) unix

d) unix

A _____ is very important to a knowledge worker's system. a) careful filing system b) financial analysis system c) CAD capability d) user-friendly interface

d) user-friendly interface

A network that covers broad geographical regions is most commonly referred to as a (n) a) local area network b) intranet c) peer-to-peer network d) wide area network

d) wide area network

Which of the following is NOT one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure? a) your firm's business strategy b) the IT investments made by competitor firms c) market demand for your firm's services d) your firm's organizational culture

d) your firm's organizational culture

(T/F) The implementation phase of Simon's decision making model includes choosing among solution alternatives.

F

In Domino's upgraded Pulse Evolution system, it incorporated a Pizza Tracker functionality that shows the progression of individual pizza orders. This is an example of using information systems to achieve which business objective? A) customer and supplier intimacy B) survival C) improved decision making D) operational excellence

A) customer and supplier intimacy

An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the A) data dictionary B) data definition diagram C) entity-relationship diagram D) relationship dictionary

A) data dictionary

Which of the following would NOT be used as an input for an information system? A) digital dashboard B) handheld computer C) bar-code scanner D) cell phone

A) digital dashboard

Enterprise application vendors have created ________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other. A) e-business suites B) ERP systems C) middleware D) legacy systems

A) e-business suites

Buying or selling goods over the Internet is called A) e-commerce. B) e-business. C) an intranet. D) an extranet.

A) e-commerce.

The CPO is responsible for A) ensuring that the company complies with existing data privacy laws. B) making better use of existing knowledge in organizational and management processes. C) enforcing the firm's information security policy. D) overseeing the use of information technology in the firm.

A) ensuring that the company complies with existing data privacy laws.

You have been hired by Inspiration Inc. to help improve their profit margin. Inspiration Inc. is a business communications consultancy that services many clients in different industries throughout the United States. The end products of the company are customized recommendations for the best use of a client's existing resources for improving internal communications, typically delivered via documentation in different media. The company has approximately 100 consultants, all of whom are located in their central headquarters in Chicago. What system do you recommend to improve the company's business processes and increase their profit margin? A) extranet, to enable quick collaboration over the Internet , minimize the time spent communicating with the client, and minimize the amount of paperwork needed B) CRM, to maintain easily accessible customer records to minimize the time spent looking for client data C) KMS, for minimizing redundant work on similar clients D) marketing system, for improving sales levels

A) extranet, to enable quick collaboration over the Internet , minimize the time spent communicating with the client, and minimize the amount of paperwork needed

Sociologists study information systems with an eye to understanding A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods.

A) how systems affect individuals, groups, and organizations.

Capabilities of supply chain execution systems would /not/ include: A) identifying the optimal transportation mode B) tracking the flow of finished goods. C) managing materials. D) managing warehouse operations.

A) identifying the optimal transportation mode

A(n) _____ system is used to identify and authorized different categories of system users and specify which portions of the organization's system each user can access A) identity management B) AUP C) authentication D) firewall

A) identity management

The primary activities of a firm include A) inbound logistics, operations, outbound logistics, sales and marketing, and service. B) inbound logistics, operations, outbound logistics, technology, and service. C) procurement, inbound logistics, operations, technology, and outbound logistics. D) procurement, operations, technology, sales and marketing, and services.

A) inbound logistics, operations, outbound logistics, sales and marketing, and service.

The organizations rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n) A) information policy B) data definition file C) data quality audit D) data governance policy

A) information policy

Which of the following would NOT be considered a disruptive technology? A) instant messaging B) e-mail C) Internet telephony D) PCs

A) instant messaging

Which of the following are key corporate assets? A) intellectual property, core competencies, and financial and human assets B) production technologies and business processes for sales, marketing, and finance C) knowledge and the firm's tangible assets, such as goods or services D) time and knowledge

A) intellectual property, core competencies, and financial and human assets

The Internet poses specific security problems because A) it was designed to be easily accessible B) Internet data is not run over secure lines C) Internet standards are universal D) it changes so rapidly

A) it was designed to be easily accessible

A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy. A) just-in-time B) stockless C) bullwhip D) safety stock

A) just-in-time

(T/F) The oldest method for building information systems is prototyping.

F

Internet technology A) makes it easy for rivals to compete on price alone. B) imposes a significant cost of entry, due to infrastructure requirements. C) increases the difference between competitors because of the wide availability of information. D) makes it easy to sustain operational advantages.

A) makes it easy for rivals to compete on price alone.

Customer relationship management systems typically provide software and online tools for sales, customer service, and: A) marketing. B) account management. C) advertising. D) public relations.

A) marketing.

According to the ________ definition of organizations, an organization is seen as a means by which primary production factors are transformed into outputs consumed by the environment. A) microeconomic B) macroeconomic C) sociotechnical D) behavioral

A) microeconomic

A firm can exercise greater control over its suppliers by having A) more suppliers. B) fewer suppliers. C) global suppliers. D) local suppliers.

A) more suppliers.

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called A) normalization B) data scrubbing C) data cleansing D) data defining

A) normalization

You are creating a video and animation sharing Web sit whose content will be supplied by content, video, and applets stored in a database and you anticipate very high loads on the server. Which of the following DBMSs will most likely serve your needs? A) object-relational DBMS B) relational DBMS C) hierarchical DBMS D) OODBMS

A) object-relational DBMS

Which of the following objectives best describes the business strategy behind the development of smart grid initiatives by power companies, as discussed in the chapter case? A) operational excellence B) new products and services C) competitive advantage D) customer support

A) operational excellence

A DBMS makes the A) physical database available for different logical views. B) logical database available for different analytical views. C) physical database available for different analytical views. D) logical database available for different physical views.

A) physical database available for different logical views

A firewall allows the organization to A) prevent unauthorized communication both into and out of the network B) monitor network hot spots for signs of intruders C) prevent known spyware and malware from entering the system D) all of the above

A) prevent unauthorized communication both into and out of the network

A field identified in a table as holding the unique identifier of the table's records is called the A) primary key B) key field C) primary field D) unique ID

A) primary key

A supply chain driven by actual customer orders or purchases follows a ________ model. A) pull-based model B) build-to-stock C) push-based D) replenishment-driven

A) pull-based model

Order data for baseball tickets and bar code data are examples of A) raw input. B) raw output. C) customer and product data. D) sales information.

A) raw input

Pharming involves A) redirecting users to a fraudulent Web sit even when the user has typed in the correct address in the Web browser B) pretending to be a legitimate business's representative in order to garner information about a security system C) Setting up fake Web sites to ask users for confidential information D) using e-mails for threats or harassment

A) redirecting users to a fraudulent Web sit even when the user has typed in the correct address in the Web browser

Duplicate data in multiple data files is called data ______ A) redundancy B) repetition C) independence D) partitions

A) redundancy

The Gramm-Leach-Bliley Act A) requires financial institutions to ensure the security of customer data B) specifies best practices in information systems security and control C) imposes responsibility on companies and management to safeguard the accuracy of financial information D) outlines medical security and privacy rules

A) requires financial institutions to ensure the security of customer data

A substitute product of most concern for a cable TV distributor is A) satellite TV. B) broadcast TV. C) satellite radio. D) the Internet.

A) satellite TV.

Phishing is a form of A) spoofing B) logging C) sniffing D) driving

A) spoofing

In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver? A) stateful inspection B) intrusion detection system C) application proxy filtering D) packet filtering

A) stateful inspection

The use of information systems because of necessity describes the business objective of A) survival. B) improved business practices. C) competitive advantage. D) improved flexibility.

A) survival

An example of a social complementary asset is A) technology and service firms in adjacent markets. B) training programs. C) distributed decision-making rights. D) all of the above.

A) technology and service firms in adjacent markets

E-government refers to the application of ________ to digitally enable government and public sector agencies' relationships with citizens, businesses, and other arms of government. A) the Internet and networking technologies B) e-commerce C) e-business D) any computerized technology

A) the Internet and networking technologies

Thomas Friedman's declaration that the world was now "flat" meant that A) the Internet has reduced the economic advantages of developed countries. B) globalization is starting to offer less advantage to large corporations. C) the global economy is increasingly commanded by fewer and larger corporations. D) global capitalism is homogenizing culture and business practices throughout the world.

A) the Internet has reduced the economic advantages of developed countries

From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable information, in a process called A) the information value chain. B) the IT value chain. C) information processing. D) feedback.

A) the information value chain

Which of the following constitutes an organizational element in the UPS tracking system described in the chapter? A) the specification of procedures for identifying packages with sender and recipient information B) monitoring service levels C) promoting the company strategy of low-cost, superior service D) the use of handheld computers and networks for managing package delivery

A) the specification of procedures for identifying packages with sender and recipient information

Which systems are typically a major source of data for other systems? A) transaction processing systems B) management information systems C) executive support systems D) decision-support systems

A) transaction processing systems

Which of the following can force a business and its competitors to compete on price alone? A) transparent marketplace B) high product differentiation C) poor process efficiency D) demand control

A) transparent marketplace

In a relational database, a record is referred to in technical terms as a(n) A) tuple B) row C) entity D) field

A) tuple

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends with A) two short marks B) one short mark C) a crow's foot D) a crow's foot topped by a short mark

A) two short marks

OLAP is a tool for enabling A) users to obtain online answers to ad-hoc questions in a rapid amount of time. B) users to view both logical and physical views of data C) programmers to quickly diagram data relationships D) programmers to normalize data.

A) users to obtain online answers to ad-hoc questions in a rapid amount of time

A virtual company A) uses the capabilities of other companies without being physically tied to those companies. B) uses Internet technology to maintain a virtual storefront. C) uses Internet technology to maintain a networked community of users. D) provides entirely Internet-driven services, or virtual products.

A) uses the capabilities of other companies without being physically tied to those companies.

A digital certificate system A) uses third-party CAs to validate a user's identity B) uses digital signatures to validate a user's identity C) uses tokens to validate a user's identity D) is used primarily by individuals for personal correspondence

A) uses third-party CAs to validate a user's identity

An example of an organizational complementary asset is A) using the appropriate business model. B) a collaborative work environment. C) laws and regulations. D) all of the above.

A) using the appropriate business model

Which of the following types of collaboration tools allows you to communicate with avatars using text messaging? A) virtual worlds B) screen sharing C) collaborative writing D) large audience Webinars

A) virtual worlds

An independent computer program that copies itself from one computer to another over a network is called a A) worm B) Trojan horse C) bug D) pest

A) worm

A bank has reworked its mortgage application process so that several steps are handled by computer software, and some steps are combined to reduce bottlenecks in processing. The goal is to gradually improve its efficiency over time. This is an example of A) automation. B) rationalization of procedures. C) paradigm shift. D) business process redesign.

B

A systems building approach in which the system is developed as successive versions, each version reflecting requirements more accurately, is described to be A) end-user oriented. B) iterative. C) object-oriented. D) agile.

B

An information system for a building company that tracks construction costs for various projects across the United States would be categorized as a type of A) DSS. B) MIS. C) GIS. D) GDSS.

B

As a technical project manager you have decided to propose implementing a prototyping methodology for a small Web-based design project. What is the order of steps you will follow in this project? A) Develop the prototype; use the prototype; revise and enhance the prototype. B) Identify user requirements, develop the prototype, use the prototype, revise and enhance the prototype. C) Define the requirements, develop solutions, select the best prototype, and implement the prototype. D) Define the requirements, develop the prototype, revise and enhance the prototype.

B

Compared to the use of proprietary components, Web services promise to be less expensive and less difficult to implement because of A) their ability to integrate seamlessly with legacy systems. B) the use of universal standards. C) the ubiquity of the Internet. D) the ability to reuse Web services components.

B

Determining methods for feedback and error handling would be defined by which category of system design specifications? A) training and documentation B) user interface C) manual procedures D) security and controls

B

Domestic exporters typically have highly ________ systems. A) duplicated B) centralized C) networked D) decentralized

B

ESS A) support the structured decision making of senior executives. B) have the ability to drill down into lower levels of detail. C) easily integrate data from different systems. D) are primarily driven by information derived from a company's transaction processing systems.

B

GDSS A) require a small number of attendees in order to maintain high levels of productivity. B) enable increasing a meeting size without reducing productivity. C) include specific procedures for priority ranking the order in which participants can respond. D) utilize shared desktop computers to foster collaboration.

B

General challenges and obstacles to global business systems are typified by A) different technology standards, shortages of skilled consultants, and social expectations. B) brand-name expectations, language differences, and commercial regulations. C) different work hours, transborder data and privacy laws, and different technology standards. D) different communications standards, language differences, and network reliability.

B

Global coordination of all of the major business functions permits the location of business activity according to A) social norms and values. B) comparative advantage. C) competitive threat. D) knowledge base.

B

Groups of objects are assembled into software components for common functions, which can be combined into large-scale business applications, in which type of software development? A) object-oriented development B) component-based development C) structured methodologies D) RAD

B

In an object-oriented development framework for a university, how would the classes Degree, Mathematics, and Physics be related? A) Degree would be a sister class to Mathematics and Physics. B) Degree is a superclass to Mathematics and Physics. C) Mathematics and Physics would be ancestors to Degree. D) Degree would be a subclass to Mathematics and Physics.

B

In contrast to the classical model of management, behavioral models see the actual behavior of managers as being more A) systematic. B) informal. C) reflective. D) well organized.

B

In decentralized systems A) development occurs at the home base and operations are handed over to autonomous units in foreign locations. B) each foreign unit designs its own unique solutions and systems. C) systems development and operations occur in an integrated and coordinated fashion across all units. D) foreign units design the solutions and systems used at the domestic home base.

B

(T/F) There are two global organization options: management is either centralized in the home country or distributed to local, foreign centers.

F

Which of the following statements best describes the business value of improved decision making? A) Improved decision making creates better products. B) Improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values. C) Improved decision making enables senior executives to more accurately foresee future financial trends. D) Improved decision making strengthens customer and supplier intimacy, which reduces costs.

B

Which phase of decision making finds or recognizes a problem, need, or opportunity? A) design B) intelligence C) choice D) implementation

B

Which process develops a detailed description of the functions that a new information system must perform? A) feasibility study B) requirements analysis C) systems design D) test plan development

B

Which type of decision is deciding whether to introduce a new product line? A) structured B) unstructured C) recurring D) nonrecurring

B

Which type of systems development is characterized by significantly speeding up the design phase and the generation of information requirements and involving users at an intense level? A) RAD B) JAD C) prototyping D) end-user development

B

Which types of systems are widely used by manufacturing and distribution firms to connect to suppliers on a global basis? A) TPS systems B) EDI systems C) CRM systems D) none of the above

B

________ provide(s) a methodology and tools for dealing with the organization's ongoing need to revise and optimize its numerous business processes. A) Business process redesign B) Business process management C) CASE tools D) TQM

B

Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company? A) Churn rate B) CLTV C) Cost per lead D) Cost per sale

B) CLTV

________ software deals with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training? A) Enterprise B) ERM C) PRM D) ERP

B) ERM

The emergence, for Amazon.com, of new competitors in the sphere of online shopping illustrates what disadvantage posed by the use of information systems to achieve competitive advantage? A) E-commerce is affected by the law of diminishing returns. B) Internet technologies are universal, and therefore usable by all companies. C) Internet shopping produces cost transparency. D) The Internet enables the production or sales of substitute products or services.

B) Internet technologies are universal, and therefore usable by all companies.

_____ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. A) Stateful inspections B) Intrusion detection systems C) Application proxy filtering technologies D) Packet filtering technologies

B) Intrusion detection systems

An example of synergy in business is A) Amazon's use of the Internet to sell books. B) JP Morgan Chase's mergers with other banks that provided JP Morgan with a network of retail branches in new regions. C) Blockbuster combining traditional video rental with online video rental. D) Wal-Mart's order entry and inventory management system to coordinate with suppliers.

B) JP Morgan Chase's mergers with other banks that provided JP Morgan with a network of retail branches in new regions.

Which of the following is an important capability for sales processes that is found in most major CRM software products? A) Returns management B) Lead management C) Channel promotions management D) Events management

B) Lead management

All of the following statements about enterprise applications are true except for? A) Enterprise applications are more successfully implemented when an organization has prepared for organizational change B) Once you have purchased an implemented a vendor's enterprise system, it is much less expensive to switch vendors. C) The total implementation cost of a large system runs into millions of dollars D) Enterprise applications are based on organization-wide definitions of data

B) Once you have purchased an implemented a vendor's enterprise system, it is much less expensive to switch vendors.

Which of the following decisions requires knowledge based on collaboration and interaction? A) How long will it take to manufacture this product? B) Should we work with with outside vendors on new products and services? C) In which geographical locations are our products garnering the most sales? D) Which product design is the most efficient for the user in terms of energy use?

B) Should we work with with outside vendors on new products and services?

________ systems integrate supplier, manufacturer, distributor, and customer logistics processes. A) Collaborative distribution B) Supply-chain management C) Reverse logistics D) Enterprise planning

B) Supply-chain management

Which type of system would you use to change a production schedule if a key supplier was late in delivering goods? A) ESS B) TPS C) MIS D) DSS

B) TPS

_____ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships. A) OLAP B) Text mining C) Web mining D) Web content mining

B) Text mining

48) Concurrent supply chains are made possible by which technology? A) ERP systems B) The Internet C) Supply chain management systems D) Just-in-time supply-chain technologies

B) The Internet

47) A build-to-order supply-chain model is also called a ________ model. A) supply-based B) demand-driven C) replenishment-driven D) push-based

B) demand-driven

The specialized language programmers use to add and change data in the database is called A) a data access language B) a data manipulation language C) Structured Query Language D) a data definition language

B) a data manipulation language

Apple Computer dominates the online legal music sales industry primarily because of a failure of recording label companies to A) invest in technology. B) adopt a new business model. C) invest in complementary assets. D) modernize their information value chain.

B) adopt a new business model

Upon which of the following industries has the Internet as a whole been a disruptive technology? A) bill payments B) air travel C) books D) real estate

B) air travel

Electronic evidence on computer storage media that is not visible to the average user is called _____ data A) defragmented B) ambient C) forensic D) fragmented

B) ambient

Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called A) a Trojan horse B) an SQL injection attack C) key logging D) a DDoS attack

B) an SQL injection attack

You work for a highly successful advertiser that is just about to expand nationally. Of utmost importance will be finding a way to store and disseminate their clients' continually updated branding guides, which include multiple image files and text documents, to all of the firm's branches. What system will best serve these needs? A) an intranet with KMS capabilities B) an extranet with KMS capabilities C) a TPS with KMS capabilities D) a CRM

B) an extranet with KMS capabilities

Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes ________ applications. A) operational CRM B) analytical CRM C) operational SCM D) analytical SFA

B) analytical CRM

Analyzing customer buying patterns is an example of: A) CLTV. B) analytical CRM. C) operational CRM. D) demand planning.

B) analytical CRM.

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect. A) network B) bullwhip C) ripple D) whirlpool

B) bullwhip

Tools for analyzing data to help users find patterns, relationships, and insights and make better business decisions are known as A) DSS B) Business intelligence C) OLAP D) Data mining

B) business intelligence

The interaction between information systems and organizations is influenced A) primarily by the decision making of middle- and senior-managers. B) by many factors, including structure, politics, culture, and environment. C) by two main microeconomic forces: capital and labor. D) primarily by the organization's business processes and culture.

B) by many factors, including structure, politics, culture, and environment.

The measurement of the number of customers who stop using or purchasing products or services from a company is called: A) switching costs. B) churn rate. C) CLTV. D) switch rate.

B) churn rate.

Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network? A) client computer B) communication lines C) corporate servers D) internal corporate back-end system

B) communication lines

The ________ model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete. A) network economics B) competitive forces C) competitive advantage D) demand control

B) competitive forces

Downtime refers to periods of time in which a A) computer system is malfunctioning B) computer system is not operational C) company or organization is not operational D) computer is not online

B) computer system is not operational

The project operation A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) organizes elements into segments. D) identifies the table from which the columns will be selected

B) creates a subset consisting of columns in a table.

Which of the following is an example of a cross-functional business process? A) identifying customers B) creating a new product C) assembling a product D) paying creditors

B) creating a new product

The data dictionary serves as an important data management tool by A) assigning attributes to the data B) creating an inventory of the data elements contained in the database. C) presenting data as end users or business specialists would perceive them D) maintaining data in updated form

B) creating an inventory of the data elements contained in the database

The confusion created by _____ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. A) batch processing B) data redundancy C) data independence D) online processing

B) data redundancy

The special organizational function whose responsibilities include the technical and operational aspects of managing data, including physical database design and maintenance, is called A) data administration B) database administration C) information policy administration D) data auditing

B) database administration

In controlling network traffic to minimize slow-downs, a technology called ______ is used to examine data files and sort low-priority data from high-priority data A) high availability computing B) deep-packet inspection C) application proxy filtering D) stateful inspection

B) deep-packet inspection

Psychologists study information systems with an eye to understanding A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods.

B) how human decision makers perceive and use formal information.

Which main business function is responsible for maintaining employee records? A) sales and marketing B) human resources C) finance and accounting D) manufacturing and production

B) human resources

Supply chain planning systems: A) track the physical status of goods. B) identify the transportation mode to use for product delivery. C) track the financial information involving all parties. D) track the status of orders.

B) identify the transportation mode to use for product delivery.

The six important business objectives of information technology are new products, services and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and A) improved flexibility B) improved decision making C) improved business practices D) improved efficiency

B) improved decision making

Verizon's implementation of a Web-based digital dashboard to provide managers with real-time information such as customer complaints is an example of A) improved flexibility. B) improved decision making. C) improved efficiency. D) customer and supplier intimacy.

B) improved decision making

How do software vendors correct flaws in their software after it has been distributed? A) issue bug fixes B) issue patches C) re-release software D) issue updated versions

B) issue patches

A field identified in a record as holding the unique identifier for that record is called the A) primary key B) key field C) primary field D) unique ID

B) key field

The four major types of competitive strategy are A) low-cost leadership; substitute products and services; customers; and suppliers. B) low-cost leadership; product differentiation; focus on market niche; and customer and supplier intimacy. C) new market entrants; substitute products and services; customers; and suppliers. D) low-cost leadership; new market entrants; product differentiation; and focus on market niche.

B) low-cost leadership; product differentiation; focus on market niche; and customer and supplier intimacy.

In a hierarchical organization, the upper levels consist of A) managerial and professional employees. B) managerial, professional, and technical employees. C) professional and operational employees. D) managerial, professional, and operational employees.

B) managerial, professional, and technical employees

When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a ________ strategy. A) product differentiation B) market niche C) mass customization D) process efficiency

B) market niche

Rigorous passwords systems A) are one of the most effective security tools B) may hinder employee productivity C) are costly to implement D) are often disregarded by employees

B) may hinder employee productivity

Disciplines that contribute to the technical approach to information systems are A) computer science, engineering, and networking. B) operations research, management science, and computer science. C) engineering, utilization management, and computer science. D) management science, computer science, and engineering.

B) operations research, management science, and computer science.

Converting raw data into a more meaningful form is called A) capturing. B) processing. C) organizing. D) feedback.

B) processing

Which of the following is /not/ one of the main problems with a traditional file environment? A) data inconsistency B) program-data independence C) lack of flexibility in creating ad-hoc reports D) poor security

B) program-data independence

Wal-Mart's continuous replenishment system allows it to A) provide mass customization. B) provide an efficient customer response system. C) strengthen customer intimacy. D) achieve economy of scale.

B) provide an efficient customer response system.

The development and use of methods to make computer systems resume their activities more quickly after mishaps his called A) high availability computing B) recovery oriented computing C) fault tolerant computing D) disaster recovery planning

B) recovery oriented computing

In a table for customers, the information about a single customer would reside in a single A) field B) row C) column D) table

B) row

An example of a professional bureaucracy is a A) small startup firm. B) school system. C) mid-size manufacturing firm. D) consulting firm.

B) school system.

The three principal levels within a business organization hierarchy are A) senior management, operational management, and service workers. B) senior management, middle management, and operational management. C) senior management, operational management, and information systems. D) senior management, middle management, and service workers.

B) senior management, middle management, and operational management.

An example of phishing is A) setting up a bogus wi-fi hot spot B) setting up a fake medical Web site that asks users for confidential information C) pretending to be a utility company's employee in order to garner information from that company about their security system D) sending bulk e-mail that asks for financial aid under a false pretext

B) setting up a fake medical Web site that asks users for confidential information

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called A) sniffing B) social engineering C) phishing D) pharming

B) social engineering

Redirecting a Web link to a different address is a form of A) snooping B) spoofing C) sniffing D) war driving

B) spoofing

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a A) distribution channel. B) supply chain. C) value chain. D) marketing channel.

B) supply chain

The temp agency that you own is having serious difficulties placing temps because few of them are familiar with Internet research. Investing in training software to enhance your workers' skills is an example of using technology to achieve which business objective? A) customer and supplier intimacy B) survival C) competitive advantage D) improved decision-making

B) survival

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? A) SSL B) symmetric key encryption C) public key encryption D) private key encryption

B) symmetric key encryption

An example of a business using information systems for customer and supplier intimacy is A) Wal-Mart's RetailLink system. B) the Mandarin Oriental hotel's customer-preference tracking system. C) Verizon's Web-based digital dashboard. D) Apple Inc.'s iPod.

B) the Mandarin Oriental hotel's customer-preference tracking system

The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output. This is referred to as A) the point of no return. B) the law of diminishing returns. C) supply and demand. D) network inelasticity.

B) the law of diminishing returns

A ________ is a method of interaction with a customer, such as telephone or customer service desk. A) point of presence B) touch point C) sales point D) client channel

B) touch point

The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as A) switching costs. B) transaction costs. C) procurement. D) agency costs.

B) transaction costs.

Which of the following best illustrates the relationship between entities and attributes? A)the entity CUSTOMER with the attribute PRODUCT B)the entity CUSTOMER with the attribute PURCHASE C)the entity PRODUCT with the attribute PURCHASE D)the entity product with the attribute CUSTOMER

B)the entity CUSTOMER with the attribute PURCHASE

A global firm can develop transnational centers of excellence as an effective technique to A) ensure connectivity between regional systems. B) encourage user support of global systems. C) effectively identify global business processes. D) develop a merit-based hierarchy among regional groups.

C

According to Mintzberg, managers in their informational role act as A) figureheads for the organization. B) leaders. C) nerve centers of the organization. D) negotiators.

C

An upscale organic foods grocery chain is implementing an information system that will enable it to add same-day home delivery of groceries to its customers. This is an example of A) automation. B) rationalization of procedures. C) paradigm shift. D) business process redesign.

C

As discussed in the chapter case, the system used in South Carolina to estimate and map the regional damage and losses resulting from an earthquake was a type of A) CDSS. B) GSS. C) GIS. D) GDSS.

C

Backward sensitivity analysis software is used for A) supply chain optimization. B) historical what-if analysis. C) goal seeking. D) reverse forecasting.

C

Changes in hardware, software, documentation, or production to a production system to correct errors, meet new requirements, or improve processing efficiencies are termed A) compliance. B) production. C) maintenance. D) acceptance.

C

Checking store inventory is an example of a(n) ________ decision. A) semistructured B) unstructured C) structured D) none of the above

C

In a parallel conversion strategy, the new system A) is tested by an outsourced company. B) replaces the old one at an appointed time. C) and the old are run together. D) is introduced in stages.

C

In networked systems A) development occurs at the home base and operations are handed over to autonomous units in foreign locations. B) each foreign unit designs its own unique solutions and systems. C) systems development and operations occur in an integrated and coordinated fashion across all units. D) foreign units design the solutions and systems used at the domestic home base.

C

In object-oriented development A) the class is used as the basic unit of systems analysis and design. B) an object is a collection of data that is acted on by external processes. C) processing logic resides within objects. D) a strict, step-by-step development process is essential.

C

In relation to global systems building, the Internet A) allows the seamless flow of information through the enterprise. B) affords local groups stable broadband access. C) has reduced some networking problems. D) all of the above.

C

Making judgments and taking action on the basis of narrow or personal characteristics is referred to as A) localization. B) cooptation. C) particularism. D) prejudicial.

C

Object-oriented development could potentially reduce the time and cost of writing software because A) object-oriented programming requires less training. B) iterative prototyping is not required. C) objects are reusable. D) a single user interface object can be used for the entire application.

C

Object-oriented modeling is based on the concepts of A) objects and relationships. B) classes and objects. C) class and inheritance. D) objects and inheritance.

C

Of the following, which is not one of the three central principles recommended in this chapter for a firm organizing itself for international business? A) Organize value-adding activities along lines of comparative advantage. B) Establish a single office responsible for international systems and a global CIO position. C) Disperse production and marketing to regional centers and establish a single center for world headquarters and strategic management. D) Develop and operate systems units at each level of corporate activityregional, national, and international.

C

Simon's description of decision making consists of which four stages? A) planning, financing, implementation, and maintenance B) planning, design, implementation, and maintenance C) intelligence, design, choice, and implementation D) intelligence, design, financing, and implementation

C

Software localization is the process of A) translating a user interface into a second language. B) converting software programming to run on a different platform. C) converting software to operate in a second language and with local conventions. D) modifying software so that it can be adopted in other countries without engineering changes.

C

The ability of global systems to optimize the use of corporate funds over a much larger capital base means that A) capital in a surplus region can be moved efficiently to expand production of capital-starved regions. B) capital costs can be accounted or spread over a larger base of constituents. C) costs can be amortized over a larger customer base. D) value chains can be synchronized more effectively.

C

The chapter case discussing the Montgomery County public school system illustrates the use of A) MIS to achieve greater operational excellence. B) ESS to enable better decision making. C) DSS to enable better decision making. D) GDSS to enable greater efficiency.

C

The concern that data values of an information source fall within a defined range reflects which quality dimension of information? A) accuracy B) integrity C) validity D) consistency

C

The four kinds of structural organizational change enabled by IT, in order from least to most risky, are A) rationalization, automation, reengineering, and redesigning. B) rationalization, automation, reengineering, and paradigm shift. C) automation, rationalization, reengineering, and paradigm shift. D) automation, redesigning, restructuring, and paradigm shift.

C

The role of liaison falls into which of Mintzberg's managerial classifications? A) decisional B) informational C) interpersonal D) symbolic

C

The way to identify core business processes is to conduct a A) cost-benefit analysis. B) work-flow analysis. C) business process analysis. D) feasibility analysis.

C

Transnational companies have tended to use a ________ systems configuration. A) duplicated B) centralized C) networked D) decentralized

C

Unit testing A) includes all the preparations for the series of tests to be performed on the system. B) tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned. C) tests each program separately. D) provides the final certification that the system is ready to be used in a production setting.

C

Which of the following is not one of the primary types of system configuration discussed in the chapter? A) decentralized B) duplicated C) coordinated D) networked

C

Which of the following is not one of the principal management challenges in developing global systems? A) encouraging local users to support global systems B) coordinating applications development C) defining an acceptable test plan D) agreeing on common user requirements

C

Which of the following is not one of the principal problems of international networks? A) network capacity B) poor quality of international service C) network standards D) regulatory constraints

C

Which type of fourth-generation language tool contains preprogrammed modules that can be used to create entire applications? A) PC software tools B) report generators C) application generators D) application software packages

C

Which type of fourth-generation language tools are end-users most likely to work with? A) report generators and query languages B) report generators and application generators C) PC software tools and query languages D) PC software tools and report generators

C

An example of raw data from a national chain of automobile stores would be A) an average of 13 Toyotas are sold daily in Kentucky. B) 30 percent increase in Toyota RAV 4 sales during September in Kentucky. C) 1 Toyota RAV4 sold March 3, 2008 in Louisville, Kentucky. D) all of the above.

C) 1 Toyota RAV4 sold March 3, 2008 in Louisville, Kentucky

A ________ is a senior manager who oversees the use of IT in the firm. A) CEO B) CFO C) CIO D) CTO

C) CIO (Chief information officer)

The ________ helps design programs and systems to find new sources of knowledge or to make better use of existing knowledge in organizational and management processes. A) CTO B) CSO C) CKO D) CPO

C) CKO (Chief knowledge officer)

_____ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. A) Software B) Administrative C) Data security D) Implementation

C) Data security

________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance. A) Management information B) Transaction processing C) Decision-support D) Knowledge management

C) Decision-support

Which supply chain planning function determines how much product is needed to satisfy all customer demands? A) Distribution management B) Replenishment planning C) Demand planning D) Order planning

C) Demand planning

________ modules deal with issues such as setting objectives, employee performance management, and performance-based compensation. A) SCM B) SFA C) ERM D) PRM

C) ERM

Which of the following is /not/ true about enterprise systems? A) Enterprise systems help firms respond rapidly to customer requests for information or products B) Enterprise system data have standardized definitions and formats that are accepted by the entire organization C) Enterprise software is expressly built to allow companies to mimic their unique business practices. D) Enterprises software includes analytical tools to evaluate overall organizational performance

C) Enterprise software is expressly built to allow companies to mimic their unique business practices

Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's A) data management environment. B) networked environment. C) IT infrastructure. D) information system.

C) IT infrastructure

Which of the following would not be considered a contact point? A) E-mail B) Web site C) Intranet D) Retail store

C) Intranet

How does the technical view of organizations fall short of understanding the full impacts of information systems in a firm? A) It sees information systems as a way to rearrange the inputs and outputs of the organization. B) It sees capital and labor as primary production factors. C) It sees the inputs and outputs, labor and capital, as being infinitely malleable. D) It sees the organization as a social structure similar to a machine.

C) It sees the inputs and outputs, labor and capital, as being infinitely malleable.

Which types of systems consolidate the relevant knowledge and experience in the firm to make it available to improve business processes and management decision making? A) TPS B) extranets C) KMS D) CRM

C) KMS

Which type of system would you use to determine the five suppliers with the worst record in delivering goods on time? A) ESS B) TPS C) MIS D) DSS

C) MIS

Smaller firms may outsource some or many security functions to A) ISPs B) MISs C) MSSPs D) CAs

C) MSSPs

The tool that enables users to view the same data in different ways using multiple dimensions is A) predictive analysis B) SQL C) OLAP D) data mining

C) OLAP

You are consulting for a beverage distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step? A) Identify the business ecosystem the distributor is in. B) Implement a strategic transition to the new system. C) Perform a strategic systems analysis. D) Benchmark existing systems.

C) Perform a strategic systems analysis.

The most prominent data manipulation language today is A) Access B) DB2 C) SQL D) Crystal Reports

C) SQL

Which of the following does /not/ pose a security threat to wireless networks? A) broadcasted SSIDs B) scannability of radio frequency bands C) SQL injection attacks D) geographic range of wireless signals

C) SQL injection attacks

Which of the following statements about collaboration is not true? A) In business, a collaboration can last as little as a few minutes. B) Business collaboration relies on the formation of teams that are assigned a specific task or goal. C) Successful collaboration can be achieved through technology regardless of the organization's culture or structure. D) One business benefit of collaboration is improved innovation.

C) Successful collaboration can be achieved through technology regardless of the organization's culture or structure.

You have been hired by a worldwide non-profit agency to implement a system to handle their donations. The system must be able to handle and record telephone, sms, and Internet donations, provide up-to-the-minute reports, and create highly customizable mailing lists. In addition, event fundraisers need to be able to quickly access a donor's information and history. Which of the following systems will best meet these needs? A) TPS B) TPS with DSS capabilities C) TPS with MIS capabilities D) TPS with ESS capabilities

C) TPS with MIS capabilities

Which of the following statements about the Internet security is /not/ true? A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one provides access C) VoIP is more secure than the switched voice network D) Instant messaging can provide hackers access to an otherwise secure network

C) VoIP is more secure than the switched voice network

You are creating a database to store temperature and wind data from national airport locations. Which of the following field is the most likely candidate to use as the basis for a primary key in the airport table? A) address B) city C) airport code D) state

C) airport code

Analytical CRM applications: A) include tools for marketing automation. B) provide consolidated data for operational CRM applications. C) are based on data warehouses consolidated from operational CRM applications. D) provide customer-facing applications.

C) are based on data warehouses consolidated from operational CRM applications

Enterprise software is built around thousands of predefined business processes that reflect. A) the firm's organization B) industry goals C) best practices D) cutting edge workflow analyses

C) best practices

Hackers create a botnet by A) infecting Web search bots with malware B) by using Web search bots to infect other computers C) by causing other people's computers to become "zombie" PCs following a master computer D) by infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door.

C) by causing other people's computers to become "zombie" Trojan horses that allow undetected access through a back door

Which of the following would not be a complementary asset for a solar panel manufacturer? A) international solar equipment certification standards B) government funding for green technology C) centralized hierarchical decision making D) innovation-driven management team

C) centralized hierarchical decision making

Engineers, scientists, or architects, who design new products or services for a firm, belong to which level of a business hierarchy? A) middle management B) production workers C) knowledge workers D) data workers

C) knowledge workers

In order to achieve maximum benefit from an enterprise software package a business A) Customizes the software to match all of its business processes B) uses only the processes in the software that match its own processes C) changes the way it works to match the software's business processes D) selects only the software that best matches its existing business processes

C) changes the way it works to match the software's business processes

Dell Computer's use of information systems to improve efficiency and implement "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business objective? A) improved flexibility B) improved business practices C) competitive advantage D) survival

C) competitive advantage

Selling a customer with a checking account a home improvement loan is an example of: A) operational CRM. B) direct marketing. C) cross-selling. D) cross-channel promotions.

C) cross-selling.

Detectign and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called A) data auditing B) defragmentation C) data scrubbing D) data optimization

C) data scrubbing

Which of the following occupations would NOT be categorized as an "interaction" job? A) sales representative B) business manager C) engineer D) operations manager

C) engineer

A schematic for the entire database that describes the relationships in a database is called a(n) A) data dictionary B) intersection relationship diagram C) entity-relationship diagram D) data definition diagram

C) entity-relationship diagram

Which of the following is NOT one of the competitive forces? A) suppliers B) other competitors C) external environment D) customers

C) external environment

You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics such as views and click-throughs about their current banner ads. What type of system will most efficiently provide a solution? A) CRM B) enterprise system C) extranet D) intranet

C) extranet

For 100% availability, online transaction processing requires A) high-capacity storage B) a multi-tier server network C) fault-tolerant computer systems D) dedicated phone lines

C) fault-tolerant computer syste,s

Hilton Hotels' use of customer information software to identify the most profitable customers to direct services to is an example of using information systems to A) strengthen customer intimacy. B) differentiate their service. C) focus on market niche. D) increase efficiency.

C) focus on market niche.

An authentication token is a(n) A) device the size of a credit card that contains access permission data B) type of smart card C) gadget that displays passcodes D) electronic marker attached to digital authorization file

C) gadget that displays passcodes

Which of the following is not a trait used for identification in biometric systems? A) retinal image B) voice C) hair color D) face

C) hair color

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that A) are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error B) are not secure because the technology to secure them did not exist at the time the files were created C) have the potential to be accessed by large numbers of people and groups outside of the organization D) are frequently available on the Internet

C) have the potential to be accessed by large numbers of people and groups outside of the organization

Marketing modules in CRM systems would provide tools for: A) assigning and managing customer service requests. B) capturing prospect and customer data. C) identifying profitable and unprofitable customers. D) managing sales prospect and contact information.

C) identifying profitable and unprofitable customers.

You work for a retail chain whose primary outlets are in shopping mall and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software that is capable of. A) identifying associations B) identifying clusters C) identifying sequences D) classification

C) identifying sequences

Which of the following is /not/ an example of a computer used as a target of crime? A) knowingly accessing a protected computer to commit fraud B) accessing a computer system without authority C) illegally accessing stored electronic communication D) threatening to cause damage to a protected computer

C) illegally accessing stored electronic communication

The Sarabanes-Oxley Act A) requires financial institutions to ensure the security of customer data B) specifies best practices in information systems security and control C) imposes responsibility on companies and management to safeguard the accuracy of financial information D) outlines medical security and privacy rules

C) imposes responsibility on companies and management to safeguard the accuracy of financial information

Overproduction or underproduction of goods and services, misallocation of resources, and poor response times are the results of a firm's having A) poor relationships with suppliers. B) poor relationships with customers. C) inadequate information. D) a surplus of information.

C) inadequate information.

The three activities in an information system that produce the information organizations use to control operations are A) information retrieval, research, and analysis. B) input, output, and feedback. C) input, processing, and output. D) data analysis, processing, and feedback.

C) input, processing, and output

A company that controls finances in the home country and decentralizes production, sales, and marketing operations to other countries is using a ________ strategy. A) domestic exporter B) franchising C) transnational D) multinational

D

A well-designed ESS will allow management to A) have greater span of control. B) assign lower levels of management greater control. C) reduce their need to review lower levels of operation. D) all of the above.

D

Acceptance testing A) includes all the preparations for the series of tests to be performed on the system. B) tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned. C) tests each program separately. D) provides the final certification that the system is ready to be used in a production setting.

D

An essential component in the ability of GDSS to contribute to a collaborative environment is A) allowing users to contribute simultaneously. B) using structured methods for evaluating ideas. C) identifying users informally. D) the guarantee of user anonymity.

D

As discussed in the chapter text, the three main reasons that investments in information technology do not always produce positive results are A) management support, technical logistics, and user compliance. B) organization, environment, culture. C) information quality, information integrity, and information accuracy. D) information quality, organizational culture, and management filters.

D

Based on your reading of the chapter, why should companies avoid creating an all-encompassing, new global system when moving towards global operations? A) These may fail due to lack of visibility. B) It is difficult to quantify and explain the benefits of information systems that are that large. C) "Grand design" approaches typically fail to identify centers of excellence. D) Opposition is strengthened because of requirements for huge resources.

D

Behavioral models of managers find that, from observation, managers A) perform often fewer than 100 activities a day. B) operate best with standardized, predictable, printed information. C) create a formalized, hierarchic structure of contacts to provide filtered information. D) typically work in a fragmented manner, with only 10% of activities exceeding an hour in duration.

D

Business intelligence would be useful for analyzing and decision-making in which of the following situations? A) deciding what marketing techniques are most successful with high-value customers B) identifying the most efficient methods for packing and delivering finished products to destinations C) forecasting the effect on sales given projected future variations in weather and other environmental variables D) all of the above

D

CASE tools automate A) documentation. B) code generation. C) creating data dictionaries. D) all of the above.

D

Categories of tools for BPM include all of the following except A) tools to integrate existing systems to support business processes improvements. B) tools to automate business processes. C) tools to identify and document business processes. D) tools to test the security of business processes.

D

GDSS A) are designed to allow meeting attendees to share their thoughts in real-time with their peers. B) support decisions that require knowledge about the geographic distribution of resources. C) are typically used with geographically dispersed attendees. D) implement structured methods for organizing and evaluating ideas.

D

In automation A) business processes are simplified. B) business processes are reorganized to cut waste and eliminate repetitive, paper-intensive tasks. C) standard operating procedures are streamlined to remove bottlenecks. D) employees are enabled to perform their tasks more efficiently.

D

In centralized systems A) development occurs at the home base and operations are handed over to autonomous units in foreign locations. B) each foreign unit designs its own unique solutions and systems. C) systems development and operations occur in an integrated and coordinated fashion across all units. D) systems development and operations occur totally at the domestic home base.

D

In terms of global business strategy and structure, a franchise company will use a policy of A) centralized production, accounting, marketing, human resources, with strategic management. B) dispersed production, accounting, human resources, with centralized strategic management, and marketing. C) dispersed production and marketing, with centralized accounting, human resources and strategic management. D) dispersed production, marketing, and human resources, with centralized strategic management and finance/accounting.

D

In terms of global business strategy and structure, a multinational company will use a policy of A) mixed sales and marketing, with centralized production, accounting, human resources, and strategic management. B) centralized production, accounting, marketing, human resources, with strategic management. C) dispersed production, accounting, human resources, with centralized strategic management, and marketing. D) dispersed production and marketing, with centralized accounting and strategic management.

D

In terms of global business strategy, the governance of ________ firms has been likened to a federal structurestrong central management core of decision making, but considerable dispersal of power and financial resources. A) domestic exporter B) multinational C) franchiser D) transnational

D

In the traditional systems development lifecycle, end users A) are important and ongoing members of the team from the original analysis phase through maintenance. B) are important only in the testing phases. C) have no input. D) are limited to providing information requirements and reviewing the technical staff's work.

D

Management should control the development of end-user applications by A) developing a formal development methodology. B) requiring cost justification for end-user IS projects. C) establishing standards for user-developed applications. D) both B and C E) both A and B

D

Multinational companies tend to have ________ systems. A) duplicated B) centralized C) networked D) decentralized

D

The decisions involved in creating and producing a corporate intranet can be classified as ________ decisions. A) procedural B) unstructured C) structured D) semistructured

D

The entire system-building effort is driven by A) organizational change. B) feasibility studies. C) the information value chain. D) user information requirements.

D

The idea that the achievement of quality control is an end in itself describes a main concept of A) BPM. B) BPR. C) six sigma. D) TQM.

D

The management methodology of using a firm's strategy to generate operational targets for the business and measuring progress towards them using the firm's enterprise systems is called A) benchmarks. B) KPIs. C) the balanced scorecard method. D) BPM.

D

The oldest method for building information systems is A) component-based development. B) prototyping. C) object-oriented development. D) the systems development lifecycle.

D

The primary tool for representing a system's component processes and the flow of data between them is the A) data dictionary. B) process specifications diagram. C) user documentation. D) data flow diagram.

D

To avoid the cost and uncertainty of moving information across national boundaries, most multinational firms A) maintain a master database at their head offices. B) develop a master system that meets the standards of all the countries concerned. C) use microwave satellite transmission to move data. D) develop separate systems within each country.

D

Transferring data from a legacy system to the new system would be defined by which category of system design specifications? A) input B) database C) manual procedures D) conversion

D

Two of the management challenges in developing global systems are listed in your text as A) (1) managing the privacy concerns of different countries and (2) coordinating applications development. B) (1) creating a financial structure that will operate internationally and (2) managing the privacy concerns of different countries. C) (1) agreeing on common user requirements and (2) managing the privacy concerns of different countries. D) (1) coordinating software releases and (2) introducing changes in business processes.

D

VPNs A) use the public Internet for communications. B) may not be able to support large numbers of remote users, due to the variable traffic on the Internet. C) provide many of the same services as private networks. D) all of the above.

D

What is the greatest barrier to successful business process change? A) ineffective project management B) usability of implemented solution C) selecting the correct process to change D) organizational change

D

When systems are created rapidly, without a formal development methodology A) end users can take over the work of IT specialists. B) the organization quickly outgrows the new system. C) hardware, software, and quality standards are less important. D) testing and documentation may be inadequate.

D

Which of the following is a disadvantage of high-velocity, automated decision-making systems? A) inability to handle high volumes of decisions B) inability to handle structured decisions C) inability to handled semi-structured decisions D) inability to control themselves and respond to new environments

D

Which of the following is not one of the main benefits to implementing global systems? A) superior management and coordination B) vast improvements in operation C) new economies of scale at production facilities D) reduced hardware costs

D

Which of the following is not one of the main organizational issues facing firms who are seeking to globalize? A) choosing a global strategy B) organizing the global business structure C) organizing the systems management D) defining the global environment

D

Which of the following is not one of the three kinds of organizational governance used by global companies? A) centralized B) decentralized C) coordinated D) localized

D

Which of the following managerial roles is not supported by information systems? A) liaison B) nerve center C) leader D) negotiator

D

Which of the following types of systems would be used to present senior marketing executives with in-depth information about customer retention, satisfaction, and quality performance. A) CDSS B) MIS C) DSS D) ESS

D

You are an IT project manager for an advertising firm. The firm wishes to create an online tool that will be used to survey focus group reactions to products in development. The most important consideration for the firm is being able to offer the tool as soon as possible as a new corporate service. However, you know that many of the senior managers that are business owners of this project have difficulty in understanding technical or software development issues, and are likely to change their requirements during the course of development. What development method would be most successful for this project? A) RAD B) JAD C) end-user development D) prototyping

D

_____ refers to all of the methods, policies ,and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards. A) "Legacy systems" B) "SSID standards" C) "Vulnerabilities" D) "Controls"

D) "Controls"

(T/F) Systems development activities always take place in sequential order.

F

(T/F) TQM describes the measurement of quality as 3.4 defects per million.

F

According to agency theory, the firm is viewed as a(n) A) unified, profit-maximizing entity. B) task force organization that must respond to rapidly changing environments. C) entrepreneurial endeavor. D) "nexus of contracts" among self-interested individuals.

D) "nexus of contracts" among self-interested individuals.

Which of the following choices may lead to competitive advantage: (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real time? A) 1 only B) 1 and 2 C) 2 and 3 D) 1, 2, and 3

D) 1,2, and 3

An example of a business using information systems to create new products and services is A) Wal-Mart's RetailLink system. B) the Mandarin Oriental hotel's customer-preference tracking system. C) Verizon's Web-based digital dashboard. D) Apple Inc.'s iPod.

D) Apple Inc.'s iPod

You are planning the launch of your new company, an application service provider that provides an online timesheet and project tracking application. To best communicate with and manage your relationship with your users, you would want to implement a(n) A) extranet. B) intranet. C) KMS. D) CMS.

D) CMS.

Microsoft SQL Server is a(n) A) DBMS for small handheld computing devices. B) Internet DBMS. B) Desktop relational DBMS. D) DBMS for midrange computers.

D) DBMS for midrange computers.

Non-typical business problems with causes and effects that are rapidly changing are typically handled by which type of information system ? A) MIS B) TPS C) ESS D) DSS

D) DSS

Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records? A) ESS B) TPS C) MIS D) DSS

D) DSS

________ are designed to support organization-wide process coordination and integration. A) Decision-support systems B) Management information systems C) CRM systems D) Enterprise applications

D) Enterprise applications

DBMS for midrange computers include all of the following EXCEPT A) DB2. B) Oracle. C) Microsoft SQL Server. D) Microsoft Access.

D) Microsoft Access.

From your reading of the Cannondale case study, the firm implemented new information systems in order to achieve which of the main six business objectives? A) Customer and supplier intimacy B) survival C) competitive advantage D) operational excellence

D) Operational excellence

From your reading of the Southwest Airlines, the company implemented a new inventory management system to achieve which of the following six business objectives? A) Customer and supplier intimacy B) new products, services and business models C) survival D) Operational excellence

D) Operational excellence

________ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners. A) SCM B) SFA C) ERM D) PRM

D) PRM

Currently, the protocols used for secure information transfer over the Internet are A) TCP/IP and SSL B) S-HTTP and CA C) HTTP and TCP/IP D) SSL, TLS, AND S-HTTP

D) SSL, TLS, and S-HTTP

________ integrate(s) multiple applications from multiple business functions, business units, or business partners to deliver a seamless experience for the customer, employee, manager, or business partner and provide a greater degree of cross-functional integration than the traditional enterprise applications. A) PRM software B) SFA software C) ERP suites D) Service platforms

D) Service platforms

All of the following are major features of organizations that impact the use of information systems EXCEPT for A) business processes. B) environments. C) goals. D) agency costs.

D) agency costs.

Which of the following are environmental actors that interact with an organization and its information systems? A) customers B) suppliers C) regulatory agencies D) all of the above

D) all of the above

A characteristic or quality describing an entity is called a(n) A) field B) tuple C) key field D) attribute

D) attribute

The most successful solutions or methods for achieving a business objective are called A) value activities. B) best processes. C) core competencies. D) best practices.

D) best practices.

Evil twins are A) Trojan horses that appears to the user to be a legitamate commercial software application B) e-mail messages that mimic the e-mail messages of a legitimate business C) fraudulent Web sites that mimic a legitimate business's Web site D) bogus wireless network access points that look legitimate to users

D) bogus wireless network access points that look legitimate to users

Which of the following is /not/ an example of a computer used as an instrument of crime? A) theft of trade secrets B) intentionally attempting to intercept electronic communication C) unauthorized copying of software D) breaching the confidentiality of protected computerized data

D) breaching the confidentiality of protected computerized data

You work for an national car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use data mining software that is capable of A) identifying associations B) identifying clusters C) identifying sequences D) classification

D) classification

A sales person clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of A) phishing B) pharming C) spoofing D) click fraud

D) click fraud

(T/F) The first stage in Simon's decision-making process model is the design stage.

F

The /select/ operation A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset of consisting of columns in a table. C) identifies the table from which the columns will be selected. D) creates a subset consisting of all records in the file that meet stated criteria.

D) creates a subset consisting of all records in the file that meet stated criteria.

A rival of your company, AutoTown, is going to implement analytic software that mines customer data with a goal of enabling the building of automobiles that customers actually want. This can be categorized as using information systems for which competitive strategy? A) low-cost leadership B) product differentiation C) focus on market niche D) customer intimacy

D) customer intimacy

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A) data normalization B) data accuracy C) data redundancy D) data inconsistency

D) data inconsistency

A company's organizations and processes for distributing and delivering products to the final customers is the A) supplier's internal supply chain. B) external supply chain. C) upstream portion of the supply chain. D) downstream portion of the supply chain.

D) downstream portion of the supply chain

The most common type of electronic evidence is A) voice mail B) spread sheets C) instant messages D) e-mail

D) e-mail

An information system can enhance core competencies by A) providing better reporting facilities. B) creating educational opportunities for management. C) allowing operational employees to interact with management. D) encouraging the sharing of knowledge across business units.

D) encouraging the sharing of knowledge across business units.

Data cleansing not only corrects errors but also A) establishes logical relationships between data B) structures data C) normalizes data D) enforces consistency among different sets of data

D) enforces consistency among different sets of data

The four major enterprise applications are A) SCMs, CRMs, DSSs, and KMSs. B) SCMs, CRMs, ESSs, and KMSs. C) enterprise systems, SCMs, DSSs, and CRMs. D) enterprise systems, SCMs, CRMs, and KMSs.

D) enterprise systems, SCMs, CRMs, and KMSs.

Supply chain ________ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner. A) demand B) delivery C) planning D) execution

D) execution

Which of the following is not one of the fifteen categories of collaborative software tools? A) file sharing B) event scheduling C) white boarding D) extranets

D) extranets

The value chain model A) categorizes five related advantages for adding value to a firm's products or services. B) sees the supply chain as the primary activity for adding value. C) categorizes four basic strategies a firm can use to enhance its value chain. D) helps a firm identify points at which information technology can most effectively enhance its competitive position.

D) helps a firm identify points at which information technology can most effectively enhance its competitive position.

A data warehouse is composed of A) historical data from legacy systems B) current data C) internal and external data sources D) historic and current internal data

D) historic and current internal data

All of the following are direct business benefits of collaboration, except for A) improved quality. B) improved financial performance. C) improved customer service. D) improved compliance with government regulations.

D) improved compliance with government regulations

The business value of an effective supply chain management system includes all of the following except: A) faster time to market. B) cost reduction. C) supply matched to demand. D) increased inventory levels.

D) increased inventory levels.

An information system can enable a company to focus on a market niche through A) complex trend forecasting. B) tailoring products to the client. C) intensive product trend analysis. D) intensive customer data analysis.

D) intensive customer data analysis.

Components or parts of finished products are referred to as A) upstream materials. B) raw materials. C) secondary products. D) intermediate products.

D) intermediate products.

Which field of study focuses on both a behavioral and technical understanding of information systems? A) sociology B) operations research C) economics D) management information systems

D) management information systems

A relocation control system that reports summaries on the total moving, house-hunting, and home financing costs for employees in all company divisions would fall into the category of A) knowledge management systems. B) transaction processing systems. C) executive support systems. D) management information systems.

D) management information systems.

Which of the following roles falls into the duties of an information systems manager? A) writing software instructions for computers B) acting as liaison between the information systems group and the rest of the organization C) translating business problems into information requirements D) managing data entry staff

D) managing data entry staff

SFA modules in CRM systems would provide tools for: A) assigning and managing customer service requests. B) capturing prospect and customer data. C) identifying profitable and unprofitable customers. D) managing sales prospect and contact information.

D) managing sales prospect and contact information.

(T/F) The first step in establishing a corporate strategy and structure for globalization is to determine the appropriate technology platform.

F

Effective networked systems must have a A) powerful telecommunications backbone. B) culture of shared applications development. C) shared management culture that crosses cultural barriers. D) both B and C. E) A, B, and C. F) none of the above.

E

An organization is a A) stable, formal social structure that takes resources from the environment and processes them to produce outputs. B) formal, legal entity with internal rules and procedures that must abide by laws. C) collection of social elements. D) B and C E) A, B, and C

E) A, B, and C

Based on the examples in the chapter, if you were asked to formulate a plan for a regional drive-in restaurant chain's efforts to use information technology to develop a loyal customer base, what would be the best use of information technology from the list below? A) Use IT to increase supplier loyalty. B) Use IT to increase operational efficiency. C) Use IT to create new products and business models. D) Use IT to help survive government reporting requirements. E) Use IT to achieve customer intimacy.

E) Use IT to achieve customer intimacy.

(T/F) A primary benefit of offshore outsourcing is that this can substantially reduce hidden costs.

F

(T/F) A structure chart is a bottom-up chart, showing each level of design, its relationship to other levels, and its place in the overall design structure.

F

(T/F) DSS are a special category of GIS.

F

(T/F) DSS primarily address structured problems.

F

(T/F) Data visualization technologies help distill large amounts of information into easily read textual lists.

F

(T/F) Documentation reveals how well the system has met its original objectives.

F

(T/F) During a GDSS meeting, the attendees control the use of GDSS tools.

F

(T/F) Global systems allow fixed costs to be amortized over a much smaller customer base.

F

(T/F) Globalization means that companies can be less concerned with the laws governing the movement of information.

F

(T/F) Improving the quality of high-value decision making by an executive will save an organization far more money than improving the quality of lesser-value decisions made at a lower level.

F

(T/F) Micromarketing describes the direct marketing of products to individuals rather than groups.

F

(T/F) Middle management face primarily unstructured decisions.

F

(T/F) Objects are grouped into hierarchies, and hierarchies into classes.

F

(T/F) One advantage of fourth-generation tools is that they can easily handle processing large numbers of transactions or applications with extensive procedural logic and updating requirements.

F

(T/F) Particularism is a concept based on accepting a shared global culture and the penetration of domestic markets by foreign goods and services.

F

(T/F) Private networks may not provide the same level of quick and predictable response as VPNs.

F

(T/F) Rationalization of procedures describes a radical rethinking of the business models.

F

Hardware and software acquisition costs account for about ______ percent of TCO a) 20 b) 40 c) 60 d) 80

a) 20

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: (1) cloud computing era (2) Client/server (3) enterprise era, (4) personal computing, and (5) mainframe and minicomputer a) 4,5,3,2,1 b) 5,4,2,3,1 c) 4,5,2,3,1 d) 5,4,2,1,3

a) 4,5,3,2,1

EBay is an example of a) C2C e-commerce b) B2B e-commerce c) B2C e-commerce d) M-commerce

a) C2C e-commerce

In this technique, descriptions of past experiences of human specialists are stored in a database for later retrieval when the user encounters a situation with similar characteristics a) CBR b) fuzzy logic c) data mining d) LMS

a) CBR

Interpretations of Moore's law assert that a) Computing power doubles every 18 months. b) Transistors decrease in size 50% every two years c) data storage costs decrease by 50% every 18 months. d) none of the above

a) Computing power doubles every 18 months.

Which of the following best illustrates the transaction fee revenue model? a) EBay receives a small fee from a seller if a seller is successful in selling an item b) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase c) Flickr provides basic services for free, but charges a premium for advanced services d) Apple accepts micropayments for single music track downloads

a) EBay receives a small fee from a seller if a seller is successful in selling an item

Which of the following services enables logging on to one computer system and working on another? a) FTP b) LISTSERV c) Telnet d) World Wide Web

a) FTP

Forward chaining is a) a strategy for searching the rule base in an expert system that begins with information entered by the user b) the programming environment of an expert system c) a method of organizing expert system knowledge into chunks d) a strategy for searching the rule base in an expert system that begins with a hypothesis

a) a strategy for searching the rule base in an expert system that begins with information entered by the user

Which of the following businesses uses the market creator business model? a) an online auction house b) an online newspaper c) a video-sharing site d) an online bookseller

a) an online auction house

The total amount of digital information that can be transmitted through any telecommunications medium is measured in a) bps b) Hertz c) baud d) gigaflops

a) bps

The most common Ethernet topology is a) bus b) star c) ring d) mesh

a) bus

__________ work by using radio waves to communicate with radio antennas placed within adjacent geographic areas a) cell phones b) microwaves c) satellites d) WANs

a) cell phones

Instant messaging is a type of _______ service a) chat b) cellular c) e-mail d) wireless

a) chat

The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called a) cloud computing b) autonomic computing c) virtualization d) multicore processing

a) cloud computing

In which of the following Internet business models does a merchant create an online digital environment that enables people with like interests to share information or buy and sell goods? a) community provider b) service provider c) market creator d) transaction broker

a) community provider

Genetic algorithms a) develop solutions to particular problems using fitness, crossover, and mutation b) represent knowledge as groups of characteristics c) do not work for most problems d) are based on logic

a) develop solutions to particular problems using fitness, crossover, and mutation

In TCP/IP, IP is responsible for a) disassembling and reassembling of packets during transmission b) establishing an Internet connection between two computers c) moving packets over the network d) sequencing the transfer of packets

a) disassembling and reassembling of packets during transmission

Reducing the business process layers in a distribution channel is called a) disintermediation b) BPR c) market segmentation d) network effects

a) disintermediation

A third-part Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n) a) exchange b) vertical market c) private exchange d) e-hub

a) exchange

Compared to traditional goods, digital goods have a) greater pricing flexibility b) lower marketing costs c) higher production costs d) higher inventory costs

a) greater pricing flexibility

Which of the following is NOT one of the current software platform trends? a) grid computing b) open source software c) mashups and apps d) software outsourcing

a) grid computing

The lowered costs of information storage, processing, and communication, along with the improvement of data quality, has resulted in which unique quality of e-commerce? a) information density b) richness c) customization d) interactivity

a) information density

Software programs that work in the background without direct human intervention to carry out specific, repetitive, and predictable tasks for individual users, business processes, or software applications are called __________ a) intelligent agents b) intelligent techniques c) business intelligence d) AI hybrid systems

a) intelligent agents

A VPN a) is an encrypted private network configured within a public network b) is more expensive than a dedicated network c) provides secure, encrypted communications using Telnet d) is an Internet-based service for delivering voice communications

a) is an encrypted private network configured within a public network

Which is meant by the statement "knowledge is sticky"? a) knowledge is hard to move b) knowledge is universally applicable c) knowledge works only in certain situations d) knowledge is intangible

a) knowledge is hard to move

Compared to traditional markets, digital markets have a) lower distributed delivery costs b) higher marginal costs per unit c) equivalent copying costs d) similar inventory costs

a) lower distributed delivery costs

Most knowledge workers require specialized knowledge work systems, but they also rely on ____ a) office systems b) schools and universities c) imaging systems d) data transferring systems

a) office systems

Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use? a) on-demand b) grid c) edge d) autonomic

a) on-demand

Digital subscriber lines a) operate over existing telephone lines to carry voice, data, and video b) operate over coaxial lines to deliver Internet access c) are very-high-speed data lines typically leased from long-distance telephone companies d) have up to twenty-four 64-Kbps channels

a) operate over existing telephone lines to carry voice, data, and video

The practice of contracting custom software development to an outside firm is commonly referred to as a) outsourcing b) scaling c) service-oriented architecture d) application integration

a) outsourcing

Informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests are called communities of ______ a) practice b) professionals c) interest d) knowledge

a) practice

The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called a) procurement b) e-procurement c) SCM d) sourcing

a) procurement

CAD workstations a) provide engineers, designers, and factory managers with precise control over industrial design and manufacturing b) provide an important source of expertise for organizations c) allow groups to work together on documents d) are high-end PCs used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management

a) provide engineers, designers, and factory managers with precise control over industrial design and manufacturing

Which of the following would NOT be considered semi-structured knowledge? a) request for proposals b) voice-mail c) videos d) e-mail

a) request for proposals

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as a) software packages b) mashups c) outsourced software d) open source software

a) software packages

An example of autonomic computing is a) spyware protection software that runs and updates itself automatically b) software programmed to run on any hardware platform c) cell phones taking on the functions of handheld computers d) programming languages that allow non-programmers to create custom applications

a) spyware protection software that runs and updates itself automatically

All network components connect to a single hub in a _________ topology a) star b) bus c) domain d) peer-to-peer

a) star

Based on your reading of the chapter, e-commerce is a) still in a revolutionary phase b) widely accepted by consumers, although technology is still quickly changing c) not yet fully accepted by consumers, although much of its driving technology is firmly in place d) well entrenched as a form of modern commerce

a) still in a revolutionary phase

In which of the following revenue models does a Web site charge a fee for access to some or all of its offerings on a continual, regular basis? a) subscription b) free/freemium c) transaction fee d) sales

a) subscription

Once a knowledge taxonomy is developed, documents are all _____ with the proper classification a) tagged b) linked c) tupled d) referenced

a) tagged

Which of the following events signified the beginning of e-commerce? a) the first online advertisements b) the first telephone sales c) the first online retail store d) the first website

a) the first online advertisements

In a phenomenon called ________, some argue that large numbers of people can make better decisions about a wide range of topics or products than a single person or even a small committee of experts a) the wisdom of crowds b) outsourcing c) crowdsourcing d) social networking

a) the wisdom of crowds

The child domain of the root is the a) top-level domain b) second-level domain c) host name d) domain extension

a) top-level domain

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? a) total cost of ownership b) return on investment c) breakeven point d) cost benefit analysis

a) total cost of ownership

Which of the following would you be most likely to use RFID technology for? a) tracking inventory b) enabling CRM systems c) lowering network costs d) enabling client communication

a) tracking inventory

As referred to in the text, legacy systems are? a) traditional mainframe-based business information systems. b) electronic spreadsheets used on a PC. c) any pre-1990 Wintel systems d) systems found on older ASPs

a) traditional mainframe-based business information systems.

E-hubs are more _________ than private industrial networks a) transaction-oriented b) collaborative c) independent d) supply-chain oriented

a) transaction-oriented

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n) a) uniform resource locator b) IP address c) third level domain d) root domain

a) uniform resource locator

The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms is? a) Unix b) Linux c) OS X d) COBOL

a) unix

Sets of loosely coupled software components that exchange information with each other using standard Web communication standards and languages are referred to as a) web services b) EAI software c) SOA d) SOAP

a) web services

Which of the following statements about B2B commerce is /not/ true? a) Eighty percent of online B2B e-commerce is still based on EDI b) B2B e-commerce represents approximately three-quarters of the overall B2B marketplace c) B2B e-commerce only includes commercial transactions between firms d) B2B e-commerce revenues in 2009 were over $3 trillion.

b) B2B e-commerce represents approximately three-quarters of the overall B2B marketplace

Consumers selling goods and services electronically to other consumers best describes a) disintermediation b) C2C e-commerce c) M-Commerce d) B2C e-commerce

b) C2C e-commerce

The leading networking hardware providers include a) Dell, HP/Comaq, and IBM. b) Cisco, Alcatel-lucent, and nortel c) Seagate, maxtor, and western digital. d) IBM, oracle, and sun.

b) Cisco, Alcatel-lucent, and nortel

A suite of integrated software modules for finance and accounting human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple function and business processes best describes. A) SCM software B) ERP systems C) ERM systems D) CRM modules

b) ERP systems

Which of the following best illustrates the affiliate revenue model? a) EBay receives a small fee from a seller if a seller is successful in selling an item b) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase c) Flickr provides basic services for free, but charges a premium for advanced services d) Apple accepts micropayments for single music track downloads

b) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase

Web browser software requests Web pages from the Internet using which protocol? a) URL b) HTTP c) DNS d) HTML

b) HTTP

Which of the following is NOT a typical component or capability of an enterprise-wide knowledge management system a) collaboration tools b) KWS c) document management d) LMS

b) KWS

Which type of network is used to connect digital devices within a half-mile or 500-meter radius? a) microwave b) LAN c) WAN d) MAN

b) LAN

A network that spans a city, and sometimes its major suburbs as well, is called a a) CAN b) MAN c) LAN d) WAN

b) MAN

What technology allows people to have content pulled from Web sites and fed automatically to their computers? a) FTP b) RSS c) HTTP d) Bluetooth

b) RSS

A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n) a) SOA b) SLA c) TCO d) RFQ

b) SLA

A SAN is a ______ network a) Server area b) Storage area c) scalable architecture d) service-oriented architecture

b) Storage area

In a multi-tiered network a) the work of the entire network is centralized. b) The work of the entire network is balanced over several levels of servers. c) Processing is split between clients and servers. d) processing is handled by multiple, geographically remote clients.

b) The work of the entire network is balanced over several levels of servers.

Which of the following describes long-tail marketing? a) The unexpected growth of sales of a product long after its initial release b) The yearly sales of one or two copies each of thousands of obscure films c) The dwindling sales of a once-popular book d) The continued successful sales of a product over years

b) The yearly sales of one or two copies each of thousands of obscure films

In a telecommunications network architecture, a protocol is a) a device that handles the switching of voice and data in a local area network b) a standard set of rules and procedures for control of communications in a network c) a communications service for microcomputer users d) the main computer in a telecommunications network

b) a standard set of rules and procedures for control of communications in a network

Net marketplaces a) focus on continuous business process coordination between companies for supply chain management b) are industry owned or operate as independent intermediaries between buyers and sellers c) are geared towards short-term spot purchasing d) are more relationship oriented than private industrial networks

b) are industry owned or operate as independent intermediaries between buyers and sellers

Legacy systems are still used because they a) can only be run on the older mainframe computers. b) are too expensive to redesign c) integrate well using Web services technologies. d) contain valuable data that would be lost during redesign.

b) are too expensive to redesign

Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party a) transparency b) asymmetry c) complexity d) discrimination

b) asymmetry

Exposing an individual to ads that are chosen and based on the recorded and analyzed online behavior of the individual is referred to as a) clickstream advertising b) behavioral targeting c) online profiling d) long-tail marketing

b) behavioral targeting

Which of the following is a type of intelligent technique? a) knowledge networks b) case based reasoning c) computer-aided design d) VRML

b) case based reasoning

Virtually all expert systems deal with problems of a) policy development b) classification c) logic and control d) high complexity

b) classification

What type of knowledge management system did Canadian Tire implement in order to improve the communication with dealers? a) digital asset management system b) content management system c) learning management system d) knowledge network system

b) content management system

IPv6 is being developed in order to a) update the packet transmission protocols for higher bandwidth b) create more IP addresses c) allow for different levels of service d) support Internet2

b) create more IP addresses

The flow of events or transactions captured by an organization's system describes _______. a) information b) data c) wisdom d) knowledge

b) data

In order, which are the value-adding steps in the knowledge business value chain? a) acquire, store, disseminate, apply, feedback b) data and information acquisition, acquire, store, disseminate, apply c) acquire, disseminate, apply, feedback, management and organizational activities d) data and information acquisition, store, disseminate, feedback, apply

b) data and information acquisition, acquire, store, disseminate, apply

You are advising a multimedia company on the best type of knowledge management system to help them archive digital video and sound clips. Which of the following will suit their needs? a) enterprise content management system b) digital asset management system c) knowledge network system d) VRML system

b) digital asset management system

Passive RFID tags a) have their own power source b) have a range of several feet c) enable data to be rewritten and modified d) are used in automated toll-collection systems

b) have a range of several feet

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as a) touch points b) hotspots c) hot points d) wireless hubs

b) hotspots

The business case for using grid computing involves all of the following EXCEPT a) cost savings b) increased accuracy c) speed of computation d) agility

b) increased accuracy

The system functionalities of an e-commerce site are best described as the a) general capabilities wanted b) information systems capabilities wanted c) information elements needed d) software and hardware required

b) information systems capabilities wanted

What type of intelligent technique helped Procter & Gamble determine the most efficient methods for their trucks to deliver goods? a) fuzzy logic b) intelligent agents c) genetic algorithms d) none of the above

b) intelligent agents

Which of the following is NOT a Web 2.0 tool firms are using to foster collaboration? a) blogs b) intranets c) wikis d) social bookmarking

b) intranets

In the United States, m-commerce a) has become widely adopted b) is still in its infancy c) now represents a major fraction of total e-commerce transactions d) is growing slowly

b) is still in its infancy

_____ often are designed and optimized for the specific tasks to be performed. a) graphics programs b) knowledge workstations c) virtual simulators d) CAD stations

b) knowledge workstations

A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location is called a(n) a) exchange b) marketspace c) online marketplace d) e-hub

b) marketspace

_______ are created by combining and customizing components from different online software applications a) apps b) mashups c) SaaS d) web services

b) mashups

Your firm, an auto parts manufacturer, has just merged with an automobile engine manufacturer, and the two companies have different SCM systems. Which of the following strategies would be the most likely course to help reduce the TCO of the merged firms' technology investments? a) use web services to join the two systems b) move one firm into using the other's system in order to centralize management and support services c) develop a single ERP system that encompasses the information needs and business processes of both firms d) purchase a hosted, on-demand ERP system that encompasses the needs and processes of both firms

b) move one firm into using the other's system in order to centralize management and support services

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called a) multiplexing b) packet switching c) packet routing d) ATM

b) packet switching

Your firm needs to implement electronic timesheet software and needs to keep within a small budget. Which of the following would be the most costly method of implementing this new software? a) purchasing a software package b) programming the new software in-house c) leasing the software over the Internet d) outsourcing the software programming to an overseas vendor

b) programming the new software in-house

Market creators a) save users money and time by processing online sales transactions b) provide a digital environment where buyers and sellers can establish for products c) create revenue by providing digital content over the Web d) sell physical products directly to consumers or individual businesses

b) provide a digital environment where buyers and sellers can establish prices for products

Transaction brokers a) generate revenue from advertising or from directing buyers to sellers b) save users money and time by processing online sales transactions c) provide a digital environment where buyers and sellers can establish prices for products d) sell physical products directly to consumers or individual businesses

b) save user money and time by processing online sales transactions

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? a) modality b) scalability c) expandability d) disintermediation

b) scalability

The effort required to locate a suitable product is called a) price discrimination b) search costs c) menu costs d) shopping costs

b) search costs

In a bus network a) signals are broadcast to the next station b) signals are broadcast in both directions to the entire network c) multiple hubs are organized in a hierarchy d) messages pass from computer in a loop

b) signals are broadcast in both directions to the entire network

The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n) a) hub b) switch c) router d) NIC

b) switch

How are the Internet and e-commerce causing severe disruption to the existing advertising business model? a) ties between customer and businesses are being rethought b) technology players such as Yahoo! seek to dominate online advertising and expand into offline ad brokerage c) new methods of advertising, such as blog advertising, are emerging d) the market entry costs for online advertising services are extremely low

b) technology players such as Yahoo! seek to dominate online advertising and expand into offline ad brokerage

EDI is a) the use of Internet technologies for electronic data transactions b) the exchange between two organizations of standard transactions through a network c) electronic data invoicing d) electronic delivery infrastructure

b) the exchange between two organizations of standard transactions through a network

Which of the following is not one of the unique features of e-commerce technology? a) information density b) transparency c) richness d) social topology

b) transparency

In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively? a) "http://", myspace, blogging, com b) "http://", com, blogging, myspace c) ".", com, blogging, myspace d) ".", myspace, blogging, com

c) ".", com, blogging, myspace

The WiMax standard can transmit up to a distance of approximately a) 30 meters b) 500 meters c) 30 miles d) 5 miles

c) 30 miles

The percentage of gross domestic product of the United States that is produced by the knowledge and information sectors is estimated to be about ________ percent. a) 20 b) 40 c) 60 d) 80

c) 60

Technology that consists of computer-based systems that attempt to emulate human behavior is called ______. a) fuzzy logic b) neural networks c) AI technology d) genetic algorithms

c) AI technology

Which of the following is a technique used to allow users to interact with a Web page without having to wait for the Web server to reload the web page? a) UDDI b) widgets c) Ajax d) java

c) Ajax

The most common Web server today, controlling 54 percent of the market, is a) Microsoft IIS b) WebSTAR c) Apache HTTP Server d) Netscape Server

c) Apache HTTP Server

Which of the following statements is true? a) GSM is the primary U.S. digital cellular standard b) CDMA's strength is in its international roaming capabilities c) CDMA randomly assigns users to a range of frequencies over time d) GSM was developed by the military during World War II

c) CDMA randomly assigns users to a range of frequencies over time

Which of the following businesses utilizes the content provider Internet business model? a) Amazon.com b) eBay.com c) CNN.com d) Motocross.com

c) CNN.com

The network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers is a) TCP/IP b) COBOL c) Ethernet d) ASCII

c) Ethernet

Which of the following is /not/ an advantage of using VOIP? a) VOIP can reduce a firm's communication costs by 20 to 30 percent b) It allows e-mail and voice mail to be combined into a single directory c) It enables the creation of two distinct networks for voice and data d) It allows net phones to be added to a network without rewiring or reconfiguring the network

c) It enables the creation of two distinct networks for voice and data

Which of the following is /not/ a characteristic of packet switching? a) Packets travel independently of each other b) Packets are routed through many different paths c) Packet switching requires point-to-point circuits d) Packets include data for checking transmission errors

c) Packet switching requires point-to-point circuits

A set of self-contained services that communicate with each other to create a working software application is called a) web services b) EAI software c) SOA d) SOAP

c) SOA

Specifications that establish the compatibility of products and the ability to communicate in a network are called a) network standards b) Telecommunications standards c) Technology standards. d) internet standards

c) Technology standards

Which of the following is /not/ a recent development in e-commerce? a) Wireless Internet connections grow rapidly b) Social networking sites become a new platform for e-commerce c) The music recording industry is disrupted as music creation and distribution become decentralized d) Online entertainment business models surge.

c) The music recording industry is disrupted as music creation and distribution become decentralized

The next evolution in wireless communication is a) 3G networks b) 2.5G networks c) WiMax d) RFID

c) WiMax

Today's nanotechnology-produced computer transistors are roughly equivalent in size to a) the width of a fingernail b) a human hair. c) a virus d) an atom

c) a virus

Linux is a) primarily concerned with the tasks of end users b) designed for specific machines and specific microprocessors c) an example of open-source software d) especially useful for processing numeric data

c) an example of open-source software

What are the four layers of the TCP/IP reference model? a) physical, application, transport, and network interface b) physical, application, Internet, and network interface c) application, transport, Internet, and network interface d) application, hardware, Internet, and network interface

c) application, transport, Internet, and network interface

T lines a) operate over existing telephone lines to carry voice, data, and video b) operate over coaxial lines to deliver Internet access c) are high-speed, leased data lines providing guaranteed service levels d) have up to twenty-four 64-Kbps channels

c) are high-speed, leased data lines providing guaranteed service levels

A software tool with a graphical user interface for displaying Web pages and for accessing the web and other internet resources is called a web _______ a) service b) client c) browser d) app

c) browser

The Internet is based on which three key technologies? a) TCP/IP, HTML, and HTTP b) TCP/IP, HTTP, and packet switching c) client/server computing, packet switching, and the development of communications standards for linking networks and computers d) client/server computing, packet switching, and HTTP

c) client/server computing, packet switching, and the development of communications standards for linking networks and computers

Bandwidth is the a) number of frequencies that can be broadcast through a medium b) number of cycles per second that can be sent through a medium c) difference between the highest and lowest frequencies that can be accommodated on a single channel d) total number of bytes that can be sent through a medium per second

c) difference between the highest and lowest frequencies that can be accommodated on a single channel

Which of the following systems digitizes, indexes, and tags documents according to a coherent framework? a) wikis b) CAD c) document management d) LMS

c) document management

Varying a product's price according to the supple situation of the seller is called _______ pricing. a) menu b) flexible c) dynamic d) asymmetric

c) dynamic

Bluetooth can be used to link up to _______ devices within a 10-meter area using low-power, radio-based communication a) four b) six c) eight d) ten

c) eight

You are an automative engineer working on an application that will automatically parallel park a car. The intelligent technique you may find most useful is a) case-based reasoning b) artificial intelligence c) fuzzy logic d) expert system

c) fuzzy logic

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called a) co-location b) edge computing c) grid computing d) utility computing

c) grid computing

How could you determine the market demand for your firm's IT services? a) perform a TCO analysis b) benchmark your services c) hold focus groups to assess your services d) analyze sales return on key investments

c) hold focus groups to assess your services

SaaS refers to a) supplying online access over networks to storage devices and storage area network technology b) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the internet c) hosting and managing access to software applications delivered over the internet to clients on a subscription basis d) none of the above

c) hosting and managing access to software applications delivered over the internet to clients on a subscription basis

Fuzzy logic is a type of _____ a) data mining b) neural network c) intelligent technique d) business intelligence

c) intelligent technique

Which of the following statements about Linux is NOT true? a) it plays a major role in the back office running local area networks b) it is available in free versions downloadable from the Internet c) it has garnered 80 percent of the server operating system market d) Linux applications are embedded in cell phones, smartphones, netbooks, and other handheld devices

c) it has garnered 80 percent of the server operating system market

Which of the following is NOT one of the main four dimensions of knowledge described in the chapter? a) knowledge is a firm asset b) knowledge has different forms c) knowledge has no locations d) knowledge is situational

c) knowledge has no locations

Which of the following statements best describes the relationship between collaboration and knowledge management? a) without knowledge, collaboration is difficult b) knowledge doesn't exist without collaboration c) knowledge is useful only when shared with others d) as knowledge increases, so does collaboration

c) knowledge is useful only when shared with others

Which of the following does grid computing utilize to create enormous supercomputing power? a) massive unused data centers b) underutilized mainframe computers c) networked computers with idle resources d) networks with low usage

c) networked computers with idle resources

Which of the following describes a difference between neural networks and genetic algorithms? a) genetic algorithms are designed to process large amounts of information b) genetic algorithms are a type of knowledge discovery, while neural networks are an intelligent technique c) neural networks are programmed to "learn" d) all of the above

c) neural networks are programmed to "learn"

It is unlikely you could represent the knowledge in the Encyclopedia Britannica with an expert system because a) there is no one expert who understands all the material contained within the encyclopedia b) the knowledge changes radically over a short time c) not all the knowledge in the encyclopedia can be represented in the form of IF-THEN rules d) the knowledge is too general

c) not all the knowledge in the encyclopedia can be represented in the form of IF-THEN rules

The set of business processes, culture, and behavior required to obtain value from investments in information systems is one type of _______ a) knowledge culture b) knowledge discovery c) organizational and management capital d) organizational routine

c) organizational and management capital

Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? a) wireless network in infrastructure mode b) domain-based LAN c) peer-to-peer network d) campus area network

c) peer-to-peer network

The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology? a) ubiquity b) personalization/customization c) richness d) interactivity

c) richness

Expert systems are expensive and time-consuming to maintain because a) their rule base is so complex b) they rely on equipment that becomes outdated c) their rules must be reprogrammed every time there is a change in the environment, which in turn may change the applicable rules d) only the person who created the system knows exactly how it works, and may not be available when changes are needed

c) their rules must be reprogrammed every time there is a change in the environment, which in turn may change the applicable rules

Which of the following statements about the use of wikis by firms is NOT true? a) they are inexpensive and easy to implement b) users are able to modify wiki content contributed by others c) they are most appropriate for information that must be revised but does not need to be available 24/7 d) they can be used as a central repository for all types of corporate data such as spreadsheets and e-mail

c) they are most appropriate for information that must be revised but does not need to be available 24/7

Information density refers to the a) richness, complexity, and content of a message b) total amount of quantity of information delivered to consumers by merchants c) total amount of quantity of information available to all market participants d) amount of information available to reduce price transparency

c) total amount of quality of information available to all market participants

Expert systems a) solve problems too difficult for human experts b) are based on DO WHILE rules c) work in very limited domains d) share characteristics with mainframe computing

c) work in very limited domains

Which of the following factors provides an understanding of why computing resources today are ever more available than in previous decades? a) Network economics b) law of mass digital storage and Moore's law c) declining communications costs, universal standards, and the Internet. d) All of the above

d) All of the above

The introduction of the minicomputer. a) allowed computers to be customized to the specific needs of departments or business units. b) enable decentralized computing. c) Offered new, powerful machines at lower prices than mainframes. d) All the above

d) All the above

Which of the following best illustrates the sales revenue model? a) EBay receives a small fee from a seller if a seller is successful in selling an item b) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase c) Flickr provides basic services for free, but charges a premium for advanced services d) Apple accepts micropayments for single music track downloads

d) Apple accepts micropayments for single music track downloads

Selling products and service directly to individual consumers via the Internet best describes a) B2B e-commerce b) C2C e-commerce c) M-commerce d) B2C e-commerce

d) B2C e-commerce

Which of the following standards is most appropriate for creating a PAN? a) WiMax b) IEEE 802.11b c) WiFi d) Bluetooth

d) Bluetooth

Which of the following is NOT an example of the emerging mobile computing platforms? a) netbooks b) the Kindle c) cell phones d) CRM

d) CRM

Which organization helps define the overall structure of the Internet? a) none (no one "owns" the Internet) b) W3C c) ICANN d) IAB

d) IAB

Which of the following statements about m-commerce is /not/ true? a) In 2010, m-commerce represented less than 10 percent of all e-commerce b) M-commerce is the fastest growing form of e-commerce c) M-commerce applications are especially popular in Europe, Japan, and South Korea d) In 2010, the top-grossing category of m-commerce was e-book sales

d) In 2010, the top-grossing category of m-commerce was e-book sales

The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called a) VPN b) IAB c) SEM d) SEO

d) SEO

Which type of infrastructure services provides voice and video connectivity to employees, customers, and suppliers? a) networking b) Telephone c) VOIP d) Telecommunications

d) Telecommunications

Which of the following statements is /not/ true about search engines? a) They are arguably the Internet's "killer app" b) They have solved the problem of how users instantly find information on the Internet c) They are monetized almost exclusively by search engine marketing d) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged

d) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged

________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience a) Wireless networks b) Intranets c) Virtual private networks d) Unified communications

d) Unified communications

Which of the following systems is NOT used to capture tacit knowledge? a) expert system b) case-based reasoning c) fuzzy logic d) neural network

d) neural network

Which type of software is created and updated by a worldwide community of programmers and available for free? a) software packages b) mashups c) outsourced d) open source

d) open source

Which of the following distinguishes wikis from blogs? a) Wikis allow users to add content, whereas blogs are created by a single person b) Blogs are personal publishing tools, while Wikis have business uses c) Wikis require some knowledge of Web programming, whereas blogs are designed to be created by people without HTML skills of any kind d) Wikis allow users to modify content created by other users, whereas blogs only allow comments to posted material

d) Wikis allow users to modify content created by other users, whereas blogs only allow comments to posted material

Backward chaining is a) a strategy for searching the rule base in an expert system that begins with information entered by the user b) the programming environment of an expert system c) a method of organizing expert system knowledge into chunks d) a strategy for searching the rule base in an expert system that begins with a hypothesis

d) a strategy for searching the rule base in an expert system that begins with a hypothesis

An interface engine is a) a strategy for searching the rule base in case-based reasoning b) the programming environment of an expert system c) a method of organizing expert system knowledge into chunks d) a strategy used to search through the rule base in an expert system by forward chaining or backward chaining

d) a strategy used to search through the rule base in an expert system by forward chaining or backward chaining

Which signal types are represented by a continuous waveform? a) laser b) optical c) digital d) analog

d) analog

Investment workstations a) provide engineers, designers, and factory managers with precise control over industrial design and manufacturing b) provide an important source of expertise for organizations c) allow groups to work together on documents d) are used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management

d) are used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management

An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called a) grid computing b) utility computing c) virtualization d) autonomic computing

d) autonomic computing

The telephone system is an example of a _________ network. a) peer-to-peer b) wireless c) packet-switched d) circuit-switched

d) circuit-switched

Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of a) prediction markets b) behavioral targeting c) long-tail marketing d) crowdsourcing

d) crowdsourcing

Which of the following techniques is used for knowledge discovery? a) expert system b) transaction processing systems c) case-based reasoning d) data mining

d) data mining

Which of the following are the three major types of knowledge management systems? a) management information systems, decision support systems, and transaction processing systems b) enterprise systems, customer support systems, and supply chain management systems c) database management systems, expert systems, and knowledge work systems d) enterprise-wide knowledge management systems, knowledge work systems, and intelligent techniques

d) enterprise-wide knowledge management systems, knowledge work systems, and intelligent techniques

Which of the following would NOT be classified as a knowledge work system? a) computer-aided design system b) 3D visualization system c) investment workstations d) expert system

d) expert system

Your company provides online tax preparation software. Users can download forms and read tips online without paying, but a fee is charged for using the advanced tax form management services. This is an example of which type of revenue model? a) subscription b) affiliate c) transaction fee d) free/freemium

d) free/freemium

Your company wants to develop intelligent techniques to create a "smart" oven that can perfectly cook basic foodstuffs, such as roasts and bread, using sensors and minimal input from the user. The system would know the difference between rare, medium rare, medium, and well done roasts. The category of intelligent technique that would describe this system is _______ a) expert system b) neural network c) care based reasoning d) fuzzy logic

d) fuzzy logic

Compared to digital markets, traditional markets have a) lower search costs b) stronger network effects c) higher delayed gratification effects d) higher transaction costs

d) higher transaction costs

To automate routine tasks to help firms search for and filter information for use in electronic commerce and supply chain management a firm would most likely use a) CAD systems b) virtual reality systems c) fuzzy logic systems d) intelligent agents

d) intelligent agents

The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology? a) ubiquity b) personalization/customization c) richness d) interactivity

d) interactivity

Why is overstocking warehouses not an effective solution for a problem of low availability? A) It does not speed product time to market. B) It is an inefficient use of raw materials. C) It increases sales costs. D) It increases inventory costs.

d) it increases inventory costs

Which of the following statements is NOT an accurate description of the importance of knowledge to a firm? a) knowledge experiences network effects as more people share it b) knowledge should be seen as an intangible key asset c) knowledge enables firms to become more efficient in their use of scarce resources d) knowledge is unconditional

d) knowledge is unconditional

Tools for the management, delivery, tracking, and assessment of various types of employee learning best describes a ______ a) investment workstation b) organizational learning system c) employee enrichment system d) learning management system

d) learning management system

Which of the following is NOT a challenge being faced by Salesforce.com, as discussed in the chapter case? a) increased competition from traditional industry leaders such as Microsoft and SAP b) continuing to differentiate its product and develop complementary new products and services c) maintaining 24/7 availability for clients d) moving into a more scalable, on-demand environment

d) moving into a more scalable, on-demand environment


संबंधित स्टडी सेट्स

9 1876-95 The destruction of the Plains Indians

View Set

Topic 6.3 - Components of fitness

View Set

CITI social and behavioral research

View Set

Chapter 12 Test, (1930s America: The New Deal)

View Set

Health Assessment Chapter 11 Questions

View Set

Chapter 21: Respiratory Care Modalities

View Set